General

  • Target

    1284-56-0x0000000002200000-0x000000000328E000-memory.dmp

  • Size

    16.6MB

  • MD5

    c35ecddacc1db54a923e456966b943e1

  • SHA1

    86c307bcc8dd0619f6b7c630c3a13108f284cb8d

  • SHA256

    73feeeb8c4329e6f75680bc227b16ae734201ef8ea7cdf42fc01a2d591e73258

  • SHA512

    a02c234aef86167a6cdabce3e40de9798f02f5e3d614876e0bace734081d03c0996ab46456758455d4d6999a6f4f359a8db4a456f6d4c5cf10fb6f014df1b564

  • SSDEEP

    3072:93sQ3HzhRHtnZ7CW5+wEM29Sg/2VZB2dyau2tsk4:qQ3TfHtnZ7CW5rEMdg/2VZB20auVk

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1284-56-0x0000000002200000-0x000000000328E000-memory.dmp
    .exe windows x86


    Headers

    Sections