General

  • Target

    1352-132-0x0000000002AB0000-0x0000000003B6A000-memory.dmp

  • Size

    16.7MB

  • MD5

    cbee8f527d21623991a953edeb86a5d4

  • SHA1

    20978cb9aba945e36bd56240f97eaf387364230a

  • SHA256

    2ed24cdb566139f1bf0a38627aea127dfd3f2750b0edca6f0afb1ace3a957a16

  • SHA512

    28d4a882ef93f1158319c6ca40b30b8cbf326e2b347fa4cb2ac32facf4673221b4accf89a6859535d3f92a8e9791347b75db93c450e6337eaf5c3e1ee66839be

  • SSDEEP

    3072:AMbeBhs0MloSJhSsMig2sVDDcCtBVvNCi9FoX+TN2p:ABBhsXHAsNg2sVDD1LvNC4oX+TNa

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1352-132-0x0000000002AB0000-0x0000000003B6A000-memory.dmp
    .exe windows x86


    Headers

    Sections