General

  • Target

    2124-134-0x00000000005F0000-0x00000000005FD000-memory.dmp

  • Size

    52KB

  • MD5

    e81bc3a3640caf39ae2c0ff21db93d32

  • SHA1

    9497a19016e71eb13f7dbf90a523de9d0fe4d560

  • SHA256

    757622252c57aea3b84097b0782f732047d9d7b1fafe6751b124629a02b45c08

  • SHA512

    e4a13f60ae67beff9380b1466e6f8892aeb404a39ecdccd1d94271416d133bb549d9a97d3e97d60aed876bb2737557983b7c943b7ed64f0943e699122a7d506d

  • SSDEEP

    1536:sw7q2B/QCv4pCS1TX09BLXYnEdMGD1Gc:zqirAxTX0PvdMA1G

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2124-134-0x00000000005F0000-0x00000000005FD000-memory.dmp
    .dll windows x86


    Headers

    Sections