Behavioral task
behavioral1
Sample
fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N.pdf
Resource
win10v2004-20240910-en
General
-
Target
fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N
-
Size
484KB
-
MD5
04c0ff60d39651bd65c0c1538694ba90
-
SHA1
8ba9def83ff505087fb99b1e769f82d9e7a7bf38
-
SHA256
fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5
-
SHA512
631e209f79e8d2152c382fb657386d431e88cff40cf766fd5557e37e1d6f3970fcf3c677f27c9df4e434ac032fdabcab62f6a840e64cd89d8e5746f62acc22d5
-
SSDEEP
12288:MCkh22Ryl7NWkFkASPixctg37mmisw+rGCu1qvuS26:MCkYwMBkASqxt37mm34TP6
Malware Config
Signatures
Files
-
fb44ae66e918fa41cfab6fc89e197236a5d4a313a43ffea164ef0ccb08f64cc5N.pdf
-
http://aws.amazon.com/agreement/
-
http://aws.amazon.com/amis
-
http://aws.amazon.com/ec2/
-
http://aws.amazon.com/ec2/,2011.7AmazonInc.Amazonmachineimage.http://aws.amazon.com/amis,2011.8AmazonInc.Amazonwebservicecustomeragreement.http://aws.amazon.com/agreement/,2011.9AMDInc.Securevirtualmachinearchitecturereferencemanual,2005.[10]Apache.ab-apachehttpserverbenchmarkingtool.http://httpd.apache.org/docs/2.0/programs/ab.html,2011.[11]A.Azab,P.Ning,Z.Wang,X.Jiang,X.Zhang,andN.Skalsky.HyperSentry:enablingstealthyin-contextmeasurementofhypervisorintegrity.InProc.CCS,pages38�49,2010.[12]P.Barham,B.Dragovic,K.Fraser,S.Hand,T.Harris,A.Ho,R.Neugebauer,I.Pratt,andA.Wareld.Xenandtheartofvirtualization.InProc.SOSP.ACM,2003.[13]M.Ben-Yehuda,M.D.Day,Z.Dubitzky,M.Factor,N.Har'El,A.Gordon,A.Liguori,O.Wasserman,andB.-A.Yassour.Theturtlesproject:Designandimplementationofnestedvirtualization.InProc.OSDI,2010.[14]H.Chen,J.Chen,W.Mao,andF.Yan.Daonity-gridsecurityfromtwolevelsofvirtualization.InformationSecurityTechnicalReport,12
-
http://cialblogoftheinvisiblethings.org
-
http://cve.mitre.org/
-
http://etal.se
-
http://fudan.edu.cn
-
http://httpd.apache.org/docs/2.0/programs/ab.html
-
http://samba.org/ftp/tridge/dbench/
-
http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/
-
http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/,2010.5D.Abramson,J.Jackson,S.Muthrasanallur,G.Neiger,G.Regnier,R.Sankaran,I.Schoinas,R.Uhlig,B.Vembu,andJ.Wiegert.IntelvirtualizationtechnologyfordirectedI/O.Inteltechnologyjournal,10
-
http://technet.microsoft.com/en-us/library/cc766200%28WS.10%29.aspx
-
http://technet.microsoft.com/en-us/library/cc766200%28WS.10%29.aspx.2Commonvulnerabilitiesandexposures.http://cve.mitre.org/.3Filevaultinmacosx.http://www.apple.com/macosx/whats-new/features.html#levault2.4Inteladvancedencryptionstandardinstructions
-
http://www.flexiant.com/products/flexiscale/
-
http://www.flexiant.com/products/flexiscale/.[21]T.Garnkel,B.Pfaff,J.Chow,M.Rosenblum,andD.Boneh.Terra:Avirtualmachine-basedplatformfortrustedcomputing.ACMSIGOPSOperatingSystemsReview,37
-
http://www.gartner.com/DisplayDocument?id=685308
-
http://www.gartner.com/DisplayDocument?id=685308,2008.[27]IntelInc.Inteltrustedexecutiontechnology.www.intel.com/technology/security/,2010.[28]R.JhalaandR.Majumdar.Softwaremodelchecking.ACMComputingSurveys
-
http://www.nimbusproject.org/
-
http://www.rackspacecloud.com/
-
http://www.spec.org/jbb2005/
-
http://www.spec.org/jbb2005/,2005.[60]U.SteinbergandB.Kauer.NOVA:Amicrohypervisor-basedsecurevirtualizationarchitecture.InProc.Eurosys,pages209�222.ACM,2010.[61]G.Suh,D.Clarke,B.Gassend,M.VanDijk,andS.Devadas.AEGIS:architecturefortamper-evidentandtamper-resistantprocessing.InProc.Supercomputing,2003.[62]T.R.Team.Rackspacecloud.http://www.rackspacecloud.com/.[63]TechSpotNews.Googleredemployeesforbreachinguserprivacy.http://www.techspot.com/news/40280-google-fired-employees-for-breaching-user-privacy.html,2010.[64]TheNimbusTeam.Nimbusproject.http://www.nimbusproject.org/.[65]A.Tridgell.Dbenchlesystembenchmark.http://samba.org/ftp/tridge/dbench/.[66]TrustedComputingGroup.Trustedplatformmodule.http://www.trustedcomputinggroup.org/,2010.[67]C.A.Waldspurger.Memoryresourcemanagementinvmwareesxserver.InProc.OSDI,pages181�194,2002.[68]Z.WangandX.Jiang.HyperSafe:Alightweightapproachtoprovidelifetimehypervisorcontrol-owintegrity.InProc.S&P
-
http://www.techspot.com/news/40280-google-fired-employees-for-breaching-user-privacy.html
-
http://www.trustedcomputinggroup.org/
- Show all
-