General

  • Target

    2252-133-0x0000000002830000-0x000000000283F000-memory.dmp

  • Size

    60KB

  • MD5

    8c663a234c94aa48755a39f17aad3b6a

  • SHA1

    56df1fda0912106d76b7af7364eefbb0e485ba56

  • SHA256

    e8db9eabca2422b3e15d09473327e61c356a29d5a5062730402cc6de8a6e8ff6

  • SHA512

    0fb059f4aab3ba89194488e2aed5c069cf5d585c7059b1753cd258e40ddc1de9c0d23f2d352aa84510d938628962f4ca97a2b5ffbbbfa695f7a8c3e4a62c1c6d

  • SSDEEP

    768:bHFuRZKCa5ayA5PLHBjderMpEvpZi7/kMPWq9aky77XTm9:bHF4EC7T5zHzeApsnI/eZDLI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7716

C2

checklist.skype.com

193.233.175.115

185.68.93.20

62.173.140.250

46.8.210.133

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2252-133-0x0000000002830000-0x000000000283F000-memory.dmp
    .exe windows x86


    Headers

    Sections