General

  • Target

    2156-59-0x0000000010000000-0x000000001000E000-memory.dmp

  • Size

    56KB

  • MD5

    08fcc6761f3ce6c0f4028f9a9502abda

  • SHA1

    c4b03057b8b334a7a5a165afaa67219b3caad731

  • SHA256

    bd9ec55371e57b035dd884bd0d31d65b9ab67d7822434e29ce916895d244fa0c

  • SHA512

    904fda95ce9f9cd15fc025de5eec81514183bd12bd078820002d972fd1e58f5eabb5bc3e62d66c5c2459f9cf03f3c54fd6ed5fa2337bc96147f7bda4868f3b06

  • SSDEEP

    768:A2zrOS/yOiLIKvJ2xyZWLR9TAZTMUVAn8+MQkR1o/wdpxvdbVck6XVR:BKSKOiL7YAq8MUVos/dpmk6f

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

2100

C2

diwdjndsfnj.ru

iwqdndomdn.su

mnvxcjieifad.su

jdsncjxjujdww.ru

Attributes
  • base_path

    /uploaded/

  • build

    250259

  • exe_type

    loader

  • extension

    .pct

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2156-59-0x0000000010000000-0x000000001000E000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections