General

  • Target

    202020x00000000004000000x0000000000486000memory_JC.dmp

  • Size

    536KB

  • MD5

    6ce7ab98e77418690e6461cd1edc389a

  • SHA1

    07716c2d2591665b1e9631b1729aab0b580d1196

  • SHA256

    24d7c6b0e067153264531c0c9f8ec68743b88c5ded5d5239a03cd1d79ceed91d

  • SHA512

    ca35544003abeece0831bacda7134cee4607a69a53394416153c43fc38fbdb7286637c4da8c4dcda911792ed373d1427070df4d4cf62782de4bfccc315d15fe5

  • SSDEEP

    3072:TrPI5jSu1GgDgfA4D3QU9ZO2O/s7J9WsLjaeAw2BjihJirmRX815QRe0TJc4:zu1GgDGJrQU9ZDtd3aeANkcaRD80T

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

https://avas1ta.com/in/login/

192.121.22.216

http://mimemoa.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202020x00000000004000000x0000000000486000memory_JC.dmp
    .exe windows:5 windows x86


    Headers

    Sections