General

  • Target

    3088-138-0x0000000000400000-0x00000000004AF000-memory.dmp

  • Size

    700KB

  • Sample

    230314-w9m63shb57

  • MD5

    6a01820178371a6ad446a58ba606337b

  • SHA1

    d67d76f6bd1685f1a55ba11f1194d7fef95e379e

  • SHA256

    db3dc47a41e89e10ac8c101d68d38793e5abacb7d83b27174c216cead259d204

  • SHA512

    96c25f4241bb70a504598562b60014425eef707f6e25d78e5e368e1f0348fab9a14faf4787ef29cddfcc3769e42c44fc8b646f4fbbf00ad8c24f87ad80aacdbf

  • SSDEEP

    3072:5fKdFRNoVUE3HnqgGupHnozyScqeENUrwSbVMUp:lKdFROVUu9G2nJSN0/

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      3088-138-0x0000000000400000-0x00000000004AF000-memory.dmp

    • Size

      700KB

    • MD5

      6a01820178371a6ad446a58ba606337b

    • SHA1

      d67d76f6bd1685f1a55ba11f1194d7fef95e379e

    • SHA256

      db3dc47a41e89e10ac8c101d68d38793e5abacb7d83b27174c216cead259d204

    • SHA512

      96c25f4241bb70a504598562b60014425eef707f6e25d78e5e368e1f0348fab9a14faf4787ef29cddfcc3769e42c44fc8b646f4fbbf00ad8c24f87ad80aacdbf

    • SSDEEP

      3072:5fKdFRNoVUE3HnqgGupHnozyScqeENUrwSbVMUp:lKdFROVUu9G2nJSN0/

    Score
    3/10

MITRE ATT&CK Matrix

Tasks