General

  • Target

    1284-56-0x0000000000400000-0x00000000004AD000-memory.dmp

  • Size

    692KB

  • MD5

    a498d2e5a602ef1dd640daa21b62c11a

  • SHA1

    7ad19f07089f07c7df25e45e7984ef8f4d873e0f

  • SHA256

    e043ae223c2531e9175baeaa159b5c1de74e2e12bd3aea7320bd0b3689cfb1d3

  • SHA512

    1d3ff27b230c92170328f2ee58fd0a9f8e9df1a1ffe4ad418740bda461647f98fd9f7f7a7867b9c572625dee79cecc71344c335747331c419fb0895e2883888b

  • SSDEEP

    3072:wfKdoyNoVUE3Hnrnz+u8TEaYDSj6krWt+3j4XBps2DnL:+KdbOVUujz+udabGTEw

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1284-56-0x0000000000400000-0x00000000004AD000-memory.dmp
    .exe windows x86


    Headers

    Sections