General

  • Target

    1324-56-0x0000000000400000-0x00000000004AF000-memory.dmp

  • Size

    700KB

  • MD5

    66967488d91448b33b385043fd4d085c

  • SHA1

    f8b5828f4129ab9b7527ac2e18438b323ec8bfc0

  • SHA256

    bf2136b30eca80fcb14ab23ec73482093723431ef9e9152b0551bc4e8e6a3c19

  • SHA512

    0c8e55a68dbc6b13f3401ade97fe64bdb303259d89b8251cf9a934070efffd9d010e70428d5af53b07a2fa81e84b036575e15e82a326b996281ac8bc16f87601

  • SSDEEP

    3072:5fK/RNoVUE3HnqgGupHnozyScqeENUrwSbVMUuT:lK/ROVUu9G2nJSN0/

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1324-56-0x0000000000400000-0x00000000004AF000-memory.dmp
    .exe windows x86


    Headers

    Sections