Behavioral task
behavioral1
Sample
Convert_mp4_to_mkv.exe
Resource
win10-20220901-en
General
-
Target
SystemBlocker.zip
-
Size
215KB
-
MD5
7da4e010d4d61005804de323e2a11ec7
-
SHA1
8892f1f0a32560982cf5093afc3904c4bf2598c7
-
SHA256
a03c529337d92e04f07fd09612cdf5fb335b1d96bf711f8d57a1d06ded2b6505
-
SHA512
5fd88a6086bf0835852093dc18c45347ae7b3b40f1273673e8c099d9ea49f58c07f305a60593ef20af79f072a1e547f69e2e7dc6590a7d8377dee33573f1e979
-
SSDEEP
3072:4IaU/hkBiFyhBSC/K2VAQlrw9CAWHYtpRPJzw9rVtpT+hlz2GCWAREDC9vryP:9/6BiFk7/KPQe9CAWE/P5wVIhlzcRmF
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/Convert_mp4_to_mkv.exe upx
Files
-
SystemBlocker.zip.zip
Password: vichingo455.github.io
-
Convert_mp4_to_mkv.exe.exe windows x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 154KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
README.txt