General

  • Target

    1720-59-0x0000000000400000-0x00000000004AD000-memory.dmp

  • Size

    692KB

  • MD5

    9f76373f68b651c092029b5324173dbc

  • SHA1

    2b3ccba2f1202ae5b59ae8ad0cdee147136fa952

  • SHA256

    8dcbb332fbf06983b543732b363c6edc231d13494ff6fe7cd45258143bae268b

  • SHA512

    609ff0b2ac6bc394d5ad2310af809bce9bd713b3d342f53e9fbaee011106cb73b72903bd3ded50439d2fca9137e431beccc51f121f5a8f2b620bf3b4e15c6144

  • SSDEEP

    3072:wfKT5ooyNoVUE3HnrnySQCah3vidXxwz45BGyapG:+KdobOVUujySxOWxwU5BG

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7715

C2

checklist.skype.com

62.173.142.81

193.233.175.113

109.248.11.184

212.109.218.26

185.68.93.7

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1720-59-0x0000000000400000-0x00000000004AD000-memory.dmp
    .exe windows x86


    Headers

    Sections