General

  • Target

    2388-135-0x0000000000400000-0x0000000000562000-memory.dmp

  • Size

    1.4MB

  • MD5

    c769bfe552605370470b5aebe512bdf6

  • SHA1

    8ac5a504de02f7c5792145f7c7e32c3e7f8c2148

  • SHA256

    f20bccc747ecec1d6db09ed5243799a3145f0887902df57f4f98b79aad6b795f

  • SHA512

    1fce2eef7e6e8f72980eadc77d39dbdf4299308d95aee2859c98773a6baf4ed6d72cb49c175e6807ef152a1321a7b993a126ee49d72121595435a2074eb45de9

  • SSDEEP

    3072:gfK+S25zT94QeZDMqPWaVU5kXTtjLXi42v0zk8BaNTRiiMwR:OK+S25t2ZPfXTtjv2v0qNfJR

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7708

C2

checklist.skype.com

62.173.147.156

31.41.44.3

46.8.19.140

45.151.232.3

62.173.139.21

185.142.99.47

31.41.44.121

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2388-135-0x0000000000400000-0x0000000000562000-memory.dmp
    .exe windows x86


    Headers

    Sections