General

  • Target

    1724-55-0x0000000000150000-0x00000000001B4000-memory.dmp

  • Size

    400KB

  • MD5

    c357293903a9a9720e48b90e3285b83b

  • SHA1

    a0b0ea124a9f41e51f1152557e4c9303bb19747d

  • SHA256

    1a852dd97365373ea080d62ed16c09864b3d0a809c57a1c758a34e68d2aa393b

  • SHA512

    aab77761c1286f355a935fb56ed499f6bcef239ff4cd87229ace1533e7efe2ce4fa2c2e423bb88f1e6bb22d235696e3f256dfb0d5af464d5db32e8182549bd72

  • SSDEEP

    768:C22cRzt2YmmZvrmyjcUT0LrqH6EHV9HmDXhVp/s6zTgMlbDlxKWAb2/1:KcRz0YmxmVmHG9HCx/jzTtbBxK8

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

999665

C2

chick.bing.com

http://176.10.111.72

http://94.247.42.106

http://94.247.42.79

http://185.212.44.76

http://45.155.249.200

http://45.155.250.216

Attributes
  • base_path

    /zerotohero/

  • build

    250257

  • exe_type

    loader

  • extension

    .asi

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1724-55-0x0000000000150000-0x00000000001B4000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections