General

  • Target

    1156-138-0x0000000000400000-0x00000000004BA000-memory.dmp

  • Size

    744KB

  • MD5

    1d8d0bf89ba3489109bf95f857398e08

  • SHA1

    a602f675a806167e2d9fcad8c9acbdd6beb366f2

  • SHA256

    573f0c16084caa599ef586014856e27caa02cc4b03f47a3d22626b9ae713c037

  • SHA512

    4c31c8c1141b768704f56bcdd39eadfa328a5f5c0fd4459f89eb56034d99b7215851d1f5f94b1481248a26070789b548e8f057e5991903992edc27b150371d56

  • SSDEEP

    3072:5fKwFRNoVUE3HnKlFMHLCS6k4fgHqteZSJyyyyy+8bIFU6OtcCXt1E3l:lKwFROVUuqluHe13IqtPyyyyyzuUbE3

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1156-138-0x0000000000400000-0x00000000004BA000-memory.dmp
    .exe windows x86


    Headers

    Sections