General

  • Target

    2044-56-0x0000000000400000-0x00000000004AF000-memory.dmp

  • Size

    700KB

  • MD5

    a9295c2190c0fc8f43ec624c79a440ff

  • SHA1

    d2001c7fdf8e3633ef3687efad60657721639cde

  • SHA256

    ee558e670e529d9cf75521377a377f7aaf68f3f90b67aba7caa7829ee1a2c249

  • SHA512

    1f261c51eeabf6660a4cb21c3d64b3a57ff2f7bb14b1fe90bd3c44aebe91f927959eeb004c3eddb20e8aa12bcdb818317467c046132d20edcaf0bb05815142f0

  • SSDEEP

    3072:5fKcRNoVUE3HnQTjYMMTxuLmz+s/9qt7:lKcROVUuKyxuLVs1qt

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2044-56-0x0000000000400000-0x00000000004AF000-memory.dmp
    .exe windows x86


    Headers

    Sections