General

  • Target

    1684-138-0x0000000000400000-0x0000000002BB3000-memory.dmp

  • Size

    39.7MB

  • MD5

    54480b6b6be4a6d66ac2796382e1f1f0

  • SHA1

    58a8173552d57f898c05749c9d82d2d44f94b4e0

  • SHA256

    273f98353aa329279324aabf8b525ec46915a7b9432103edfa951930607d79b2

  • SHA512

    5c3098c1b6f26e12ba03b176a537827054a3cab58d2fca01f015471476413f2793a9cbb051bd048a9b5714b95800ab31478ad53dfef118ec6997fbf5685ef6f7

  • SSDEEP

    3072:4fK1Eh5zT94QeZDMp9es8OhXdkH7GTkwbpSGrKRW5NVdXesRvnB9azOPR:WK1Eh5t2OYO9dTkSRKMR40WzOP

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7709

C2

checklist.skype.com

62.173.141.252

31.41.44.33

109.248.11.112

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1684-138-0x0000000000400000-0x0000000002BB3000-memory.dmp
    .exe windows x86


    Headers

    Sections