General

  • Target

    1556-59-0x0000000000400000-0x00000000004BA000-memory.dmp

  • Size

    744KB

  • MD5

    012a94ba0896ff5119d51487d9a7aaf5

  • SHA1

    f14b1e44c9b6b7a883d06a108434b1ac0acd60eb

  • SHA256

    7807cc39443296f0fdd5d7f1161eb5c02943869de2f169a70fb782cbe5665deb

  • SHA512

    6388d6299723f2528571863cb9aeefab2c57df46a3d7e9dab3b6ad7b6c82f254eca66e83b6bdcf31b439f7d92b7bc70f24189551b80c70b8ae99d7b0ae689027

  • SSDEEP

    6144:lKHFROVUuiwgCQmouPnL1xN2kQ2NMiXSz:leFROOuiwgCQBuD1xNt9NM

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1556-59-0x0000000000400000-0x00000000004BA000-memory.dmp
    .exe windows x86


    Headers

    Sections