Behavioral task
behavioral1
Sample
1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.dmp
-
Size
16.7MB
-
MD5
18ab7b8250d38080fb97ad2c229cf963
-
SHA1
81dd660942dfd1ad755fd24f6c5b9b1753302b06
-
SHA256
ad1fb1fad5ceab7e40ee5b26a72d3cf0c8b4265a8113e89b1efc79ce6888a441
-
SHA512
ae6e9c95644b33ec2a611b568b6e42aff6581124f4fb8d2e4f69eaafa0fc5480e7528f2ed1e52cc5730d60ee94b9cd1191f96b57d09a2ff1dbf4c8edaf772aeb
-
SSDEEP
3072:8CBhs0MwfGJV54MfxgDX/skiVRGuy9AoX+TN2p:8CBhsXWc54kxG/sk+RGudoX+TNa
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
Files
-
1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 688KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE