General

  • Target

    1704-56-0x0000000000250000-0x000000000025D000-memory.dmp

  • Size

    52KB

  • MD5

    7ed724139fa2a3cfe862b931062c378f

  • SHA1

    dec32358b27c3366305977cb544c4ec22c0e19b2

  • SHA256

    062d707c72fce7032a61544acbc17782424cc04ef3326d13a48438a583d9f1a8

  • SHA512

    3c46f651539ee470c98eb5327091ab0e22d32cd4b62a0b7e75a4a971b5a3765ab2ca76eaadaabb7d6f3b671fbda693b98c059bc23466467f5e1afa01b6bd6366

  • SSDEEP

    768:4FQdqLXhZGD4Kv/840Umm2HGoZeaS/ulcsetO5ldM5hK3D1Gc:4KdqeJv/8YmPTZspsetUldMmD1Gc

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1704-56-0x0000000000250000-0x000000000025D000-memory.dmp
    .dll windows x86


    Headers

    Sections