General

  • Target

    gozi.payload-disk

  • Size

    43KB

  • MD5

    16354909ed898b5cfd7a93f3276738d2

  • SHA1

    4bedd0621709dd570494a0fa47998142d8cc4697

  • SHA256

    584cbb9fc336e7c571bcb61c7f6e6eee7af60a56c81bf2d3f2b60338de0b7354

  • SHA512

    910bd89c2826803a9404ae5814f3ee963b2c4f5e8c4f68ec33cf9fa379d43869bbe274e65c348bd1ad4dd7f2860c0fa27b2bd2d315e8c46442b65e9cd1d59ccc

  • SSDEEP

    768:aQO60dvSXUWzHY4kD/zaho82WVV3rh5Uznoo7e6GzheOB/G7gpdS4JowCyjQBOEM:XOLgy4kD/2H2WjbhcTGNeOdG7uS45QBK

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7702

C2

checklist.skype.com

62.173.138.160

31.41.44.122

193.0.178.141

Attributes
  • base_path

    /drew/

  • build

    250249

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • gozi.payload-disk
    .dll windows x86

    ef075d26b728b78a932306e24062e80c


    Headers

    Imports

    Sections