General

  • Target

    1792-57-0x0000000000200000-0x000000000026E000-memory.dmp

  • Size

    440KB

  • MD5

    b7c6122f62aafd2363a97c6671edf221

  • SHA1

    d8684d1edd396bf6313cce7631aec8664a894241

  • SHA256

    a29c6c4c9984b09fbd1e875d6dbeb1a1407688ca4c86ca50584710f310072aea

  • SHA512

    3015bdde24a945604e20f53fc4849f20fd212cf954b4072c6ff09e583026d95c3fef41992ed6ee90ecd078aad8ce29a00f303d2e19324967a594abd758695abc

  • SSDEEP

    1536:+KPd6sHMtt8rNq4ni5Gu8KN5Jhto+AMHHboIJpCRkX:+KPd6sH+t8rNqJ5B9htnp0

Score
10/10

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3000

C2

config.edge.skype.com

79.110.52.164

79.110.52.97

Attributes
  • base_path

    /drew/

  • build

    250239

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1792-57-0x0000000000200000-0x000000000026E000-memory.dmp
    .dll windows x86


    Headers

    Sections