General

  • Target

    2712-135-0x00000000021E0000-0x00000000021ED000-memory.dmp

  • Size

    52KB

  • MD5

    960191b9275bfda68b9e05c91468e832

  • SHA1

    ea72c195af3bf3cc2dbae57a5b9f9ff21b20112c

  • SHA256

    87729fc33a44fb8e2d44b183fcf79881c354650d7d71113ff8f69dbb3b269535

  • SHA512

    acfc4a9019857f027b9b2ba303f09209c6d5a4d5974b9a41d9c4e56c9888ab5d0b68a546d38af89df3c78b56c45d3bcd93e93de6e6651313412fd3bee80b3607

  • SSDEEP

    768:5EQAH8qFrgc+QxmjW/I4WIQR7GHzx2WZ23KNech/+QiqpiNdMhhK3D1Gc:mBcq5+W/ILFRId2Wdhtiq8NdMeD1Gc

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7711

C2

checklist.skype.com

62.173.138.6

89.117.37.146

46.8.210.82

89.116.227.15

31.41.44.51

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2712-135-0x00000000021E0000-0x00000000021ED000-memory.dmp
    .dll windows x86


    Headers

    Sections