General

  • Target

    1672-5-0x0000000000260000-0x000000000026F000-memory.dmp

  • Size

    60KB

  • Sample

    231011-lycabsfd4s

  • MD5

    c08022f18c841c836a47d5de1f0e2721

  • SHA1

    60ec1b1987e8a22c81b1c0a8df7a7f9770cd851e

  • SHA256

    f7636890842f376b91a73b6f59c85934912cde00d0bbf64b825b91f05d270281

  • SHA512

    042a319e2e190689929eae065ba5cebc5c81d9b60bfe389e1b0b366366cfdc6d81bc72008625b4d811f5632723ecf06f49fac36ea12896c65af07a9e1d088a79

  • SSDEEP

    768:2SxrPI5NegruwlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:PxrPI5NVHZjLVJaf3C7YJj3HG0JC

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

netsecurez.com

whofoxy.com

mimemoa.com

ntcgo.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      1672-5-0x0000000000260000-0x000000000026F000-memory.dmp

    • Size

      60KB

    • MD5

      c08022f18c841c836a47d5de1f0e2721

    • SHA1

      60ec1b1987e8a22c81b1c0a8df7a7f9770cd851e

    • SHA256

      f7636890842f376b91a73b6f59c85934912cde00d0bbf64b825b91f05d270281

    • SHA512

      042a319e2e190689929eae065ba5cebc5c81d9b60bfe389e1b0b366366cfdc6d81bc72008625b4d811f5632723ecf06f49fac36ea12896c65af07a9e1d088a79

    • SSDEEP

      768:2SxrPI5NegruwlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:PxrPI5NVHZjLVJaf3C7YJj3HG0JC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks