Assignment1 AMAnalysis I202001
Assignment1 AMAnalysis I202001
Malware 1:
Malware 2:
Malware 3:
Hash 7682b842ed75b69e23c5deecf05a45ee79c723d98cfb6746380d748145bfc1af
(SHA1)
File Type Portable Executable (PE)
Target Windows
System
Target 32 bit
CPU
Compiler Friday, May 29,1992, 06:33:05
Stamp
Subsyste GUI
m
Permissi
ons CODE DATA .data
Not writeable writeable writeable
executable - -
Readable Readable readable
Potential Kernel32. User32. advapi32. oleaut32. version. gdi32. comctl32 comdlg32
ly abused dll dll dll dll dll dll .dll .dll
Libraries
Packing unpacked
String String Analysis yields that it can access monitor info as well as keyboard layout so is
Analysis potentially used to log keystrokes as well as the clipboard.
Malware 4:
Malware 5:
Hash c0242d686b4c1707f9db2eb5afdd306507ceb5637d72662dff56c439330dbdf1
(SHA1)
File Executable
Type
Target Windows
System
Target 32 bit
CPU
Compile Saturday, April 18,1992
r Stamp
Subsyst GUI
em
Permissi CODE .DATA .rdata
ons Not writeable writeable Not writeable
executable - -
Readable Readable readable
Potentia Kernel3 User32 Advapi32 Oleaut3 Version Gdi32. Ole32 Comctl3 Comdlg
lly 2.dll .dll .dll 2.dll .dll dll .dll 2.dll .dll
abused
Librarie
s
Packing unpacked
String Ability to force shutdown, connect to the internet, get monitor information, simulate
Analysis internet to listen to communication, access to keyboard layout as well as key states
possibly for key logging, data stealing.
Malware 6:
Malware 7:
Malware 8: