General

  • Target

    3040-135-0x0000000002CA0000-0x0000000002CAD000-memory.dmp

  • Size

    52KB

  • MD5

    d3124e41a3c011a5fef550a72f48b3f4

  • SHA1

    d735d2e723fddcc9c7d44ca985069842a0e93b37

  • SHA256

    6474698c351c04923fa50399270f369c4a729c03c276e0a0cb3cc9d4db54a642

  • SHA512

    6b5311349b5b5d59c83e82c34353a93976e3bcd53472e27ab1d7d410c9540e3c12b0b0e37ef12cc781dcece988dc9e89fd5131b9635d16092fc529987ba5f929

  • SSDEEP

    1536:FFwqoK/onfJhCsWVqwdmwMU8zdMeD1Gc:EqPOfJ0sWVq/VfdMI1G

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7709

C2

checklist.skype.com

62.173.141.252

31.41.44.33

109.248.11.112

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3040-135-0x0000000002CA0000-0x0000000002CAD000-memory.dmp
    .dll windows x86


    Headers

    Sections