General

  • Target

    1832-57-0x0000000010000000-0x000000001000E000-memory.dmp

  • Size

    56KB

  • MD5

    3b88a777f40cb2ca7c962a6f1ff9d380

  • SHA1

    f1d486102f6e27fa23eef3aa91cfb50622ceda3d

  • SHA256

    0b25ad7cfa1bffb013c33053e6058eac04522a42ef0b0f7b08cf83f449baede1

  • SHA512

    52651cd36df9045ba81027ed102c7b3d20caed2f241e6f008c59a9e3b038e090c626e606cac48e95f2fcb35562e9df2a33180c81f63aa48dd51b4fda0e59124f

  • SSDEEP

    768:A2PrU7eukUXM7dLVvWTyTdcNtW2RTYBfx6w39rDE3Lkjx2K/ZK38u5:laeuZM7BsTqdeD8B56w39HE384h38K

Score
10/10

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3000

C2

config.edge.skype.com

37.120.206.71

37.120.206.84

193.106.191.163

Attributes
  • base_path

    /drew/

  • build

    250240

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1832-57-0x0000000010000000-0x000000001000E000-memory.dmp
    .dll windows x86


    Headers

    Sections