Behavioral task
behavioral1
Sample
3372-130-0x0000000003790000-0x000000000481E000-memory.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
3372-130-0x0000000003790000-0x000000000481E000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
3372-130-0x0000000003790000-0x000000000481E000-memory.dmp
-
Size
16.6MB
-
MD5
b6612708017821f9afb67cd487d591a5
-
SHA1
b1eddc75b4c1d388b93283702d37778e4c662b7b
-
SHA256
c5519ec930a68a4557296fe12666232047a5f6a181990db91d535fc5b18d2739
-
SHA512
57211e23d67ce1466631097d37a135d2ca053ed240560152db25916b47f3c58e86d39fa7d3a136ee903d7d8034b653aec1e9f1145e6df2525e6e21e021647c1c
-
SSDEEP
6144:pUFJ2prCjfs/QIUHQE0t0/2VkMBus/W+7S:pSJ2AjfssHQEdS77S
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
Files
-
3372-130-0x0000000003790000-0x000000000481E000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 516KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE