General

  • Target

    1552-56-0x0000000000400000-0x00000000004DB000-memory.dmp

  • Size

    876KB

  • MD5

    4f7f4d220a45f8ac0a7cb330c54ce7a9

  • SHA1

    d4481ae4d2e2cf1e8af50e2bdd8bd11df900cdf6

  • SHA256

    730e4df2c0ad9fe17459dc84faa45368a006a2252ab339ecadffc09843083e3a

  • SHA512

    3c7e26afd04b1f75b6f239341f41462e6b64ad705ace4b602c7e2a11f1209267d9d5b7fc11f804de4d54fe4cf58aa83c2a1e95f32cb7a8b57979910cab88cd9f

  • SSDEEP

    3072:VfKAVNoVUE3HnPjiKAOSArhKmj03oXGjyaFgE92ZP+4Ysd8BH1mgwn0JV:RKAVOVUuvm96fOyad9L4Y3u

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.50

31.41.44.87

109.248.11.217

212.109.218.151

5.44.45.83

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1552-56-0x0000000000400000-0x00000000004DB000-memory.dmp
    .exe windows x86


    Headers

    Sections