General

  • Target

    3092-135-0x0000000000690000-0x000000000069D000-memory.dmp

  • Size

    52KB

  • MD5

    b4bd728caa3db4e3ab502506db67943a

  • SHA1

    789cb5065f95577fba567410f2ae7f168ce3911b

  • SHA256

    6b05b6c2b715e9011e6ef4dfc5ffbead40bb02c27fb0153afb8de702446ae6d8

  • SHA512

    11bd04c5c31d426d7eab7a51b36ebc2e084864dd6c6ba9382625bab95740f56c77b190b0b484479b087f2f8dfbf19c8042d4b0b2f7e446b74a989162a5c617f9

  • SSDEEP

    1536:0ORqYRr/csqr79KBhYYbbtkodMeD1GcM:DqMFqr79nYbbNdMI1GF

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.50

31.41.44.87

109.248.11.217

212.109.218.151

5.44.45.83

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3092-135-0x0000000000690000-0x000000000069D000-memory.dmp
    .dll windows x86


    Headers

    Sections