General

  • Target

    1676-56-0x0000000000400000-0x0000000002B6C000-memory.dmp

  • Size

    39.4MB

  • MD5

    7543e66bea40d7e52eb66526ede76c39

  • SHA1

    79e8de08016d4db50a877e156d5b6435106c501c

  • SHA256

    af543d6476bb9096db48cd348aebb37dcd5edc0c419be3f5b4376448976c6a9b

  • SHA512

    4cb6d5db2a062d9f11f17c0518e70e4f90dbd199387bccf26836932890218ba913ad08caee5a46b9dfbe0bc8d2bf7b6974d9d07fcab6d3f0f083b0861e57cb0a

  • SSDEEP

    3072:2fKLrT5zT94QeZD3AgTs/DauD4zhjI5d8Pimo1odk08mf71aOefgZHbwoXzF2WNB:gKfT5t2DTOwNAuPZoBmBsIhw8zF2j

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7716

C2

checklist.skype.com

193.233.175.115

185.68.93.20

62.173.140.250

46.8.210.133

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1676-56-0x0000000000400000-0x0000000002B6C000-memory.dmp
    .exe windows x86


    Headers

    Sections