General

  • Target

    84820x00000000004000000x0000000000486000memory_JC.dmp

  • Size

    536KB

  • MD5

    4709e39f68adeef21aa9c747b97b22c7

  • SHA1

    4db807c444d54239ef73cf8abd67f1c1eb5e3360

  • SHA256

    249e9046e5aa61e11050477576f052d979ca16aa0f53d198f3444ae7098c61d5

  • SHA512

    57b833081c652f43321c3c79f741e52b4e38bf373d825ef86588209210c26ff70fced9155cacf905fd773368b5410f36e7d203d6203f7f70b51af575a3843b57

  • SSDEEP

    3072:TrPI5jSu19gDgfA4D3j+6XrgGHT4SW4NsnGC4EN/kMBsupYX9c5o/STtyl:zu19gDGJrj+6JHT4+WlkgQL/STk

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

https://avas1ta.com/in/login/

192.121.22.216

http://mimemoa.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 84820x00000000004000000x0000000000486000memory_JC.dmp
    .exe windows:5 windows x86


    Headers

    Sections