Behavioral task
behavioral1
Sample
Startsym1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Startsym1.exe
Resource
win10v2004-20220812-en
General
-
Target
Startsym1.exe
-
Size
48KB
-
MD5
1ae080b109bc5ab7cfd42e5d02b12437
-
SHA1
0e48b88e2a79cc437bfd4934064e2779da9940b8
-
SHA256
bfa5dba46db1253587058b0392c04c8403846fa55d7dcf1044e94e6a654d4715
-
SHA512
61f080e620572e4f131c8a931aef775be6c384ae4ff1f843dba30c0f5a399e95e0c23279f8c87cf5da152bda23593133aac030fdc886db29ce9021f77bd3c75a
-
SSDEEP
384:zqHMmP96PzXflkuAL0OzZOxcejrjTxEABlayQo2HJT4C5+N0ps9o7lBE6:zqHMml8vlkuALR4abfHSCRSMlO
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1THD-itP7iOm05w_6SQSb-C3tgd3cLMzO
Signatures
-
Guloader family
Files
-
Startsym1.exe.exe windows x86
e5dc9f90e63a8223ac7d0f9627dcbb68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
ord698
_adj_fprem1
ord518
ord519
__vbaHresultCheckObj
ord557
_adj_fdiv_m32
__vbaAryDestruct
__vbaObjSet
_adj_fdiv_m16i
ord702
_adj_fdivr_m16i
ord598
_CIsin
ord632
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
ord529
__vbaVarTstEq
ord560
__vbaI2I4
__vbaCastObjVar
_adj_fpatan
ord676
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
ord710
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaI4Str
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaVarDup
ord613
__vbaVarLateMemCallLd
_CIatan
__vbaStrMove
ord543
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ