General

  • Target

    1360-54-0x00000000001B0000-0x00000000001BF000-memory.dmp

  • Size

    60KB

  • MD5

    9c4dc0957d59fdc9d6819c7aa0325140

  • SHA1

    1985683c367dd602b7e6fc0ede01e4beaf02db57

  • SHA256

    38212dcc18def590149c8a3e47c023defc29810111d2e32aaee9cdcc6e972b3d

  • SHA512

    de21623191efc1bdbde1eec4086d6a3c6881472b3c3f6221fc69f1ff6985791f879f566ef0d897461f0155c93bc8a18f64fe5952064383efae8b23ae50815bdd

  • SSDEEP

    768:1fymS3D8VayA5PLHBjderMpEvpZi7/kMPWq9aky77XTm9:1fnepT5zHzeApsnI/eZDLI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7716

C2

checklist.skype.com

193.233.175.115

185.68.93.20

62.173.140.250

46.8.210.133

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1360-54-0x00000000001B0000-0x00000000001BF000-memory.dmp
    .exe windows x86


    Headers

    Sections