Behavioral task
behavioral1
Sample
f6414a857e535cd44ccd6690cfdcaa26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6414a857e535cd44ccd6690cfdcaa26.exe
Resource
win10v2004-20231222-en
General
-
Target
f6414a857e535cd44ccd6690cfdcaa26.exe
-
Size
329KB
-
MD5
f6414a857e535cd44ccd6690cfdcaa26
-
SHA1
fcd8247acc9826d4b9beedf25ac6612142b94828
-
SHA256
989201a80123df6a4896c0775b118f483b80715a3729328ecad03199f1c1987b
-
SHA512
2e6393386be7f84b246a8c98fe9e3b5c1ffeea2f24bc6dcfa9884a28aa45db14359e21819dbf585d7f3e6573f336f1f4d0b240a74a30dc125837618f358f156f
-
SSDEEP
6144:px4wawztws+H3Lb+Qw/WYgFIgsh0KXoQr8jTQjewInBIE1+J3RzAHV+EueR2F:0wO7LKQweY0sam38vZwIBIE1+J3pQtI
Malware Config
Signatures
-
Berbew family
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule sample family_berbew -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6414a857e535cd44ccd6690cfdcaa26.exe
Files
-
f6414a857e535cd44ccd6690cfdcaa26.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ