General

  • Target

    852-135-0x0000000000400000-0x000000000055E000-memory.dmp

  • Size

    1.4MB

  • MD5

    6a942f7786b78a37454fd7e5c6250870

  • SHA1

    2f5544b25dada82408faa16c2731e39399b4269b

  • SHA256

    bf1ebf0c7af6b46aac3b40b2c7577df9c63277acb642de38bb375cad0081892b

  • SHA512

    ab468150afe419fbf5ca3540a165ab3ec34da3ba0f761b3a6652abbc1d020418aab1a6aa8e6ee062c4e3a2e3b03cefe3485610013c0fc98e269d776cef60a46a

  • SSDEEP

    3072:gfKNS25zT94QeZDLzA+iQC7AUgA0f6PZO/nFedrsliStAyo:OKNS25t2fzK7AmJO/nFe9StD

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7708

C2

checklist.skype.com

62.173.147.156

31.41.44.3

46.8.19.140

45.151.232.3

62.173.139.21

185.142.99.47

31.41.44.121

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 852-135-0x0000000000400000-0x000000000055E000-memory.dmp
    .exe windows x86


    Headers

    Sections