General

  • Target

    1852-138-0x0000000000400000-0x00000000004DA000-memory.dmp

  • Size

    872KB

  • MD5

    ed3ab0442861013666c79e81fc8aad1e

  • SHA1

    5fcc647614463fe404a150ac36966d8839bffbd7

  • SHA256

    8993fc68fa7f91e7d6e736f628a5bbda863da6e83725b63795bfe3586a30e2e3

  • SHA512

    0f692480840d2d2254efddb20bcb42a7d690e83e7af2837bdfef37b509a71a29eb5d899bdf04aa59ed1ee93e4c8551c25db37d9967acdc0943cfa867750229f9

  • SSDEEP

    3072:VfKepVNoVUE3Hn1PItYtuTei0NsE97ZidnUJE8DYGi85JdAnlV:RKepVOVUuVPycuoNfsii4JdA

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.50

31.41.44.87

109.248.11.217

212.109.218.151

5.44.45.83

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1852-138-0x0000000000400000-0x00000000004DA000-memory.dmp
    .exe windows x86


    Headers

    Sections