General

  • Target

    460-138-0x0000000000400000-0x0000000002B0F000-memory.dmp

  • Size

    39.1MB

  • MD5

    5f17dce763f86ff8daca5a81a17b7241

  • SHA1

    33cebbe69c98d5f1beddf90aac056367d4a71398

  • SHA256

    00a80f2b1921f826318487f275836d6e915607eb0ad7635299b418859ae49c80

  • SHA512

    36d09da216e2a04b4c94437dcdcea3b6444c1513e170aabed5ffc71111b497220d4a2ab7284dc4c4e4f5147cc0017c358657ea8c3750fe95112f9547fe54890e

  • SSDEEP

    3072:KfKWGDN0K3vMUZr2VDhW8c/S9OC1hE/uJuP8QrW7yNlfo:0KWGDB3vC1R9p02p9Ke

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7714

C2

checklist.skype.com

5.44.43.17

31.41.44.108

62.173.138.213

109.248.11.174

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 460-138-0x0000000000400000-0x0000000002B0F000-memory.dmp
    .exe windows x86


    Headers

    Sections