General

  • Target

    3372-130-0x0000000003790000-0x000000000481E000-memory.dmp

  • Size

    16.6MB

  • MD5

    b6612708017821f9afb67cd487d591a5

  • SHA1

    b1eddc75b4c1d388b93283702d37778e4c662b7b

  • SHA256

    c5519ec930a68a4557296fe12666232047a5f6a181990db91d535fc5b18d2739

  • SHA512

    57211e23d67ce1466631097d37a135d2ca053ed240560152db25916b47f3c58e86d39fa7d3a136ee903d7d8034b653aec1e9f1145e6df2525e6e21e021647c1c

  • SSDEEP

    6144:pUFJ2prCjfs/QIUHQE0t0/2VkMBus/W+7S:pSJ2AjfssHQEdS77S

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 3372-130-0x0000000003790000-0x000000000481E000-memory.dmp
    .exe windows x86


    Headers

    Sections