General

  • Target

    f3a3e9faec4ea1eec2ebc894b2022d870afb59fa5e8d832012089603f5471131

  • Size

    37KB

  • MD5

    492701ef7731de344ca3c7ce877b2b75

  • SHA1

    c937f08bd4fec53112f223dd5a15d713cb7433dd

  • SHA256

    f3a3e9faec4ea1eec2ebc894b2022d870afb59fa5e8d832012089603f5471131

  • SHA512

    22ebaa8c2f6c0eb500156598bc6f4bd4f89cab5b32922c21f2d51e23ec46d2279aa9d620e7022cb942bb806bb65a294035ca94f57c85c6ed591b9c9cfdb86091

  • SSDEEP

    768:ybQ3ZaF3VH8yRaiNSEyuadlyFhbTkHVBH5h4LOQrD/Y0:ybcZaF3udMSvLlwNAHjH5h4PXg0

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

300

C2

gdsgwefewrewr.ru

hfdhdfgrre.ru

hfdhfdhdfhdfa.ru

Attributes
  • base_path

    /uploaded/

  • build

    250257

  • exe_type

    loader

  • extension

    .pct

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f3a3e9faec4ea1eec2ebc894b2022d870afb59fa5e8d832012089603f5471131
    .exe windows:5 windows x86

    1640d668d1471f340cbe565fe63522f6


    Headers

    Imports

    Sections