General

  • Target

    1740-56-0x0000000000400000-0x00000000004AF000-memory.dmp

  • Size

    700KB

  • MD5

    39b720b4bddb616d1484e0742fdcd69d

  • SHA1

    4ef559c9886bb2e8d5317ba5df53527612c006ea

  • SHA256

    4884a40e8fd4a26c240b43046d64e29c5d40779d7a500888ac9a6b346ad6ff3a

  • SHA512

    74aa7bc4a6252dda3beeed9f192ed283ba7165141e8f64008c3f01e9b4a39f19b339a20e2d3083785ced6322f7e0dd639c955189441d2d272d5c2f7c480b14d1

  • SSDEEP

    3072:5fKHRNoVUE3HnqgGupHnozyScqeENUrwSbVMU/L:lKHROVUu9G2nJSN0/

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1740-56-0x0000000000400000-0x00000000004AF000-memory.dmp
    .exe windows x86


    Headers

    Sections