General

  • Target

    2020-161-0x00000000075E0000-0x0000000007682000-memory.dmp

  • Size

    648KB

  • MD5

    0ad68656b13f35eee3c6995e4b2764bb

  • SHA1

    ed812e4a2157ed9c2de148f0a71b72cc5d4bcdc6

  • SHA256

    866118f5474d14dfb36830d992aa4ffc994c23233736632ef8234b973db26c67

  • SHA512

    3ec92e872ad01b272168bf74f79b662a3fe686da5ed6ab494300ccb47af26f42ea91c95fb92735af044d451be83b1fd17bed085558cac758782c08e2154154c7

  • SSDEEP

    12288:Vbpy9XP+0ZX7XGXgSjHql5YMsqxVl3pZ/lht9Ta:Vbpy9P+0ZXGhaRsqxVxtA

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7639

C2

185.31.162.9

31.41.46.120

31.41.44.71

62.173.147.138

31.41.44.79

62.173.147.142

62.173.147.64

Attributes
  • base_path

    /drew/

  • exe_type

    worker

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2020-161-0x00000000075E0000-0x0000000007682000-memory.dmp