General

  • Target

    3092-138-0x0000000000400000-0x00000000004DA000-memory.dmp

  • Size

    872KB

  • MD5

    f321af33f8aa491628180b042fe957c0

  • SHA1

    2a7edc2c5634ab40b5a12227116b81498d3b8e71

  • SHA256

    eafbc36a4f5d5e3f9994ab406f402d3a801268702565d438bd586d67750791ef

  • SHA512

    6d26c0bacaf4ba657880130d3b036f5919f0a6c8e3a70bfc48c4f420226215f9207657a74859f1a0f933e5991e60a26b8ce63dcf70ef16b0ea1e9066a0d73af9

  • SSDEEP

    3072:VfKrpVNoVUE3Hn1yLphftoPL0qDWEFYhLlgsr/PJlDiXEgaTtmUjwJJ:RKrpVOVUuVyVeLiEehC2leEgaTtmUj

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.50

31.41.44.87

109.248.11.217

212.109.218.151

5.44.45.83

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3092-138-0x0000000000400000-0x00000000004DA000-memory.dmp
    .exe windows x86


    Headers

    Sections