General

  • Target

    608-59-0x0000000000400000-0x00000000004AD000-memory.dmp

  • Size

    692KB

  • MD5

    fe5cf997e640c40495991a0a6f1f4b9a

  • SHA1

    4c0f2c2e523b58ec08ebe24cebacb16146e72e82

  • SHA256

    3ea713cb1fa4d8a30a442d77db87111c216a51d71a7ac9f01ad470a0a19cea90

  • SHA512

    2003322301290f677fa989b12c53d740fc9ccb7ef4d107c5ed618159b48bf49b38486bafcdb84b078c2b07bc1dc066d09ea32212d0823da66bbbe8f528c81c5c

  • SSDEEP

    3072:wfKMooyNoVUE3HnrnW91O6lbP+pnW6ya2wPAnBu84:+KMobOVUuj0O6lz6Tyatw

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 608-59-0x0000000000400000-0x00000000004AD000-memory.dmp
    .exe windows x86


    Headers

    Sections