General

  • Target

    2408-1-0x0000000000080000-0x000000000008F000-memory.dmp

  • Size

    60KB

  • Sample

    231011-n1dbhsdc5t

  • MD5

    29b9f898bec674e935aedb433c926a1d

  • SHA1

    8dc6248763d1615b67279b61658b7e073a4b6f05

  • SHA256

    77ab6ecd7747f497b3477c924bfcae8a2dc07e48eb95fae43cf91a56be671605

  • SHA512

    2edf8af3bc35badcbd247aaf4f7cce40ab67c8460911aae565d5a1a0f3d00ebf8549a2af51733abb86c7e2d8faaf6a7fa04a0cf981331f5b714363556bdebbc8

  • SSDEEP

    768:0IvrPI5L0055/lZcyVZXdP53D9wCYLXaq+4UGJtsa2cdHlZe:DvrPI5LTdZc2ZNPLwPaq+4U8tsafda

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

https://avas1ta.com/in/login/

192.121.22.216

http://mimemoa.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      2408-1-0x0000000000080000-0x000000000008F000-memory.dmp

    • Size

      60KB

    • MD5

      29b9f898bec674e935aedb433c926a1d

    • SHA1

      8dc6248763d1615b67279b61658b7e073a4b6f05

    • SHA256

      77ab6ecd7747f497b3477c924bfcae8a2dc07e48eb95fae43cf91a56be671605

    • SHA512

      2edf8af3bc35badcbd247aaf4f7cce40ab67c8460911aae565d5a1a0f3d00ebf8549a2af51733abb86c7e2d8faaf6a7fa04a0cf981331f5b714363556bdebbc8

    • SSDEEP

      768:0IvrPI5L0055/lZcyVZXdP53D9wCYLXaq+4UGJtsa2cdHlZe:DvrPI5LTdZc2ZNPLwPaq+4U8tsafda

    Score
    3/10

MITRE ATT&CK Matrix

Tasks