General

  • Target

    2204-2-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • MD5

    20486a07107303c135fd6cc5558e9e21

  • SHA1

    18eb328f12601c6314ccd855cd5df4d645be3cf1

  • SHA256

    6b3a6e6a07e54d5846d56e78a4e060a8217a84b75d6fba60e01552059c11d662

  • SHA512

    c406915b562800a6620f93744a566768a860540ca726f4198a7c87fc996cbc6d25b0b74d1ca24e9f3b43b68c15ea3e2614d801dbabbf965de78cdd96b47c29d3

  • SSDEEP

    3072:WrPI5jSu1dZLaHZ5VYnurTtk6IbV418GM7cCtHEaV0AtdQa9l0Ck5bU:mu1dZLU7VYnuFkrdb3Q8l0Zb

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2204-2-0x0000000000400000-0x000000000228F000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections