General

  • Target

    1364-2-0x0000000000400000-0x0000000002287000-memory.dmp

  • Size

    30.5MB

  • MD5

    c04c9ecd221b076673e979ed9c540de1

  • SHA1

    49e7953b0121ec7ca5dc65cd605c0894540e25c4

  • SHA256

    f6202e3cf9e7490f06de5d895cd731fef469e571a4ddc43ece84297a0ca94860

  • SHA512

    4e796513e187658f5971abc9075e6b6f38e45c67643026b26d8f5b94e69bfcc3b007bdf1eaf02b9da60b2619773da4828a97f0343183f22a6a040382a8405ea3

  • SSDEEP

    3072:+rPI5jSu1eqPrYLubQ26C6VmOrAMfby4zMOMQth/a4:Ou1eqPr7U2yXJzMst

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

45.93.139.24

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1364-2-0x0000000000400000-0x0000000002287000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections