General

  • Target

    1416-56-0x00000000002D0000-0x00000000002DD000-memory.dmp

  • Size

    52KB

  • MD5

    02ff77d216b87b80d82d5aa7659e370c

  • SHA1

    a176b0d0fd28b70eb70b94a1c8c61720d354c5f7

  • SHA256

    3ced6066ac9e31be926163ba2dd5662a5933cc91422b17b5c80f46b14bf86190

  • SHA512

    34ad296325d5f56da75e23bfe08a9f9926d846fbfe67784bb330287a680119b720e5d90e084894f24a32414bddc83b16c1af82467e1afbdfa088497cbcd02484

  • SSDEEP

    1536:Y6Bnlqajb/swSL3zRwppNVcDpdMWD1Gc:1lq4Z+3zRwNkdMw1G

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1416-56-0x00000000002D0000-0x00000000002DD000-memory.dmp
    .dll windows x86


    Headers

    Sections