General

  • Target

    836-2-0x0000000000520000-0x00000000015DA000-memory.dmp

  • Size

    16.7MB

  • MD5

    bfc09304bcca94c6b83625f0351fb9f2

  • SHA1

    69c34788533992bbad0f5a0579ecd543edc8ae26

  • SHA256

    ecb724899b6d03456bbb63a96e68da2b44a0a68fc3e44853ab11cfc642d0a154

  • SHA512

    4472c45abc21a1831009667d531bb71b27d60e71d4758afbb56307be0e739eb6e494d14c288388581985868ffffc3d9cdf46260f17ac7bf221de79acaeba71d7

  • SSDEEP

    3072:JBhs0MkKFKgrdX+Mtz250shIVNgYte9qoX+Tl2p:JBhsXprdX+ez250sKNgUfoX+Tla

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-2-0x0000000000520000-0x00000000015DA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections