General

  • Target

    2040-57-0x0000000000400000-0x0000000000463000-memory.dmp

  • Size

    396KB

  • MD5

    27c2f64dca5794ff3c60b82b979ee84b

  • SHA1

    d0f6492a2d7d8904f00a467d28958e3956062d9e

  • SHA256

    fbe77ed8e0e713743f265b94c8ac13993fac1d4aeff8e7acd012f9620636486e

  • SHA512

    cdb151c3f67bc9c3f7dade728100e3355ad251b137dc204398095223190cf53ef6c35ea2a8a44ac17dc3876082874ec399883a102e419621c8bb81d46c96f7e7

  • SSDEEP

    6144:CYSPYZnXb4Vyu+PR8PQ85IgSdW85cK4eRu4:CYSPwrsDsBCzKl8

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7639

C2

31.41.44.43

62.173.147.143

31.41.44.63

62.173.147.113

Attributes
  • base_path

    /drew/

  • build

    250249

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2040-57-0x0000000000400000-0x0000000000463000-memory.dmp
    .exe windows x86


    Headers

    Sections