General

  • Target

    c6fb26e9b766e7c3981718d0be69da30888af632365b5eb05b8930d32f518945

  • Size

    28KB

  • MD5

    8b1c1f8a9d4ff0b46d36452228be5d29

  • SHA1

    4d7c390379dfeb169f8d63b48d694a4bc9d88e6d

  • SHA256

    c6fb26e9b766e7c3981718d0be69da30888af632365b5eb05b8930d32f518945

  • SHA512

    a374fc30b739aa738429fd38aa1da0cae3afa3357f2336aa21b2f149f5ee665ac459a88aa0bca116949330a8e842f7f2ab0da2a8a181421fdab226911b91d06e

  • SSDEEP

    768:kU3kG24DQ9/67QcsFqY4eh+FtSkP2jDC6kNSi:RXnDcS7QcsFTjQ/uXkAi

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

7708

C2

checklist.skype.com

185.31.160.197

31.41.44.76

194.116.163.130

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c6fb26e9b766e7c3981718d0be69da30888af632365b5eb05b8930d32f518945
    .zip

    Password: infected

  • b994d6c78aab2c73c21bbebc4ae04a003d18d98da6a840e265f2f028110adb46
    .dll windows:5 windows x86 arch:x86

    ef075d26b728b78a932306e24062e80c


    Headers

    Imports

    Sections