Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Berbew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Backdoor.Win32.Berbew.exe
Resource
win10v2004-20240802-en
General
-
Target
Backdoor.Win32.Berbew.pz-0764bca7ade6509ec35da057b86368678d3118a407bc903873a87e2b10d95231N
-
Size
96KB
-
MD5
e053933b6cef47376c50a6d6e835e440
-
SHA1
97b35bc2991db6efbb6eed4235bc93b613c44b5d
-
SHA256
0764bca7ade6509ec35da057b86368678d3118a407bc903873a87e2b10d95231
-
SHA512
2f5732fed8133a524d95d224e67108ad69681f2a2810795a975d37ea740896a056268ef767736902f266d810db802fda5423b509e2d4f7f4554a48229a9535d8
-
SSDEEP
1536:t0JkmHh6X5EZ6zSpk9+j7McYk/r4XfKC6olpzBUe9MbinV39+ChnSdFFn7Elz45Q:qkgQJEZ6zS2c9/vMUAMbqV39ThSdn7EZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Backdoor.Win32.Berbew.pz-0764bca7ade6509ec35da057b86368678d3118a407bc903873a87e2b10d95231N
Files
-
Backdoor.Win32.Berbew.pz-0764bca7ade6509ec35da057b86368678d3118a407bc903873a87e2b10d95231N.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfcd Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ