General

  • Target

    2204-2-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • Sample

    231011-rs973adb8t

  • MD5

    20486a07107303c135fd6cc5558e9e21

  • SHA1

    18eb328f12601c6314ccd855cd5df4d645be3cf1

  • SHA256

    6b3a6e6a07e54d5846d56e78a4e060a8217a84b75d6fba60e01552059c11d662

  • SHA512

    c406915b562800a6620f93744a566768a860540ca726f4198a7c87fc996cbc6d25b0b74d1ca24e9f3b43b68c15ea3e2614d801dbabbf965de78cdd96b47c29d3

  • SSDEEP

    3072:WrPI5jSu1dZLaHZ5VYnurTtk6IbV418GM7cCtHEaV0AtdQa9l0Ck5bU:mu1dZLU7VYnuFkrdb3Q8l0Zb

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      2204-2-0x0000000000400000-0x000000000228F000-memory.dmp

    • Size

      30.6MB

    • MD5

      20486a07107303c135fd6cc5558e9e21

    • SHA1

      18eb328f12601c6314ccd855cd5df4d645be3cf1

    • SHA256

      6b3a6e6a07e54d5846d56e78a4e060a8217a84b75d6fba60e01552059c11d662

    • SHA512

      c406915b562800a6620f93744a566768a860540ca726f4198a7c87fc996cbc6d25b0b74d1ca24e9f3b43b68c15ea3e2614d801dbabbf965de78cdd96b47c29d3

    • SSDEEP

      3072:WrPI5jSu1dZLaHZ5VYnurTtk6IbV418GM7cCtHEaV0AtdQa9l0Ck5bU:mu1dZLU7VYnuFkrdb3Q8l0Zb

    Score
    3/10

MITRE ATT&CK Matrix

Tasks