General

  • Target

    1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.dmp

  • Size

    16.7MB

  • MD5

    18ab7b8250d38080fb97ad2c229cf963

  • SHA1

    81dd660942dfd1ad755fd24f6c5b9b1753302b06

  • SHA256

    ad1fb1fad5ceab7e40ee5b26a72d3cf0c8b4265a8113e89b1efc79ce6888a441

  • SHA512

    ae6e9c95644b33ec2a611b568b6e42aff6581124f4fb8d2e4f69eaafa0fc5480e7528f2ed1e52cc5730d60ee94b9cd1191f96b57d09a2ff1dbf4c8edaf772aeb

  • SSDEEP

    3072:8CBhs0MwfGJV54MfxgDX/skiVRGuy9AoX+TN2p:8CBhsXWc54kxG/sk+RGudoX+TNa

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1500-55-0x0000000001CF0000-0x0000000002DAA000-memory.dmp
    .exe windows x86


    Headers

    Sections