General

  • Target

    1616-61-0x0000000000960000-0x0000000001A1A000-memory.dmp

  • Size

    16.7MB

  • MD5

    47b9e45d1e2882eeb37e06248c730792

  • SHA1

    1ef6e510b0e517c0b9b1aa8c78865276604d64d1

  • SHA256

    47a2a5475982c1849220b10220b1329b8647ca39f2f19143f6e2504be1a39569

  • SHA512

    9b15539d5bd65ea7d870c9f6fbb1b046d551604e8ac63f736713d9790100274e2ba1f04a2c6878794473c2a945d27777ec27646229a005578dfc568affa3fc0c

  • SSDEEP

    6144:6BhsXKiXR37NC36XmN4Mv+F87CgxPQVLoX+Tda:pKiXR37Nm9mF87CgxPQVM

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1616-61-0x0000000000960000-0x0000000001A1A000-memory.dmp
    .exe windows x86


    Headers

    Sections