General

  • Target

    1948-57-0x0000000010000000-0x000000001000E000-memory.dmp

  • Size

    56KB

  • MD5

    a1a94bbfeca70b2aef3054cd50b97a2b

  • SHA1

    b07092d895ffbd23888246f13a89823a85e34304

  • SHA256

    aa16e07ecb03e6e55248f0b2c59efecc6a59f9d78cbb6c6e8294fc2714debbbf

  • SHA512

    ddc1c16f9d58ac6fa5de968c97baaf4ac0ffa346f931420aa494090a61e4faa19c983e20d56ed6bbb4c59b835c22e0d85380576564f57bfb2a99219ddaaf37a1

  • SSDEEP

    768:A2JrU7eukUXM7dAVvWPyiYlC0VwS3ADFXpTadRx337aOlBDsvO5P:PaeuZM7msPBqC0V93AtpGX3L/l5sgP

Score
10/10

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3000

C2

config.edge.skype.com

79.110.52.8

79.110.52.80

193.106.191.163

Attributes
  • base_path

    /drew/

  • build

    250240

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1948-57-0x0000000010000000-0x000000001000E000-memory.dmp
    .dll windows x86


    Headers

    Sections