PUP.Screenmate.A
Table of Contents
Analysis Report
General information
| Family Name: | PUP.Screenmate.A |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
4ea4a20cdc2e2cb99963f5731e2c85da
SHA1:
835552f0c767ff8ecb1543921601b07a34447ce5
SHA256:
E82808228015CB96A20522DA0A49EBDCFA1C22E13B71FB1BCBA79094FD1640B7
File Size:
305.31 KB, 305312 bytes
|
|
MD5:
bdbf13cf7f3efaca3b74f313c543cdd2
SHA1:
86980116dbad0706a7e4f9e36e2e104b67b1f6cd
SHA256:
620D60A78998157FB56BC9969781699425DA4F4AB0445BA2C56C4C8AF87B2B3A
File Size:
249.86 KB, 249856 bytes
|
|
MD5:
3df600d6f433ff0d3aedfde7b04632a9
SHA1:
092bf804539f49339f633d117f92f9b77022ecd9
SHA256:
ECB336A185D1A1FBC4087E26375102AAA72BE7A1E969DA591CCD5797DB0AD822
File Size:
253.95 KB, 253952 bytes
|
|
MD5:
fb4c6b4d4631f60a450a161f75f1efad
SHA1:
cf0a9b46b8af8d8d9493709888472a54ed5e8e1b
SHA256:
20B4AB337041A65D7663BE9482C9355D889F0876C877BB907B6D8C22C85EF323
File Size:
307.25 KB, 307246 bytes
|
|
MD5:
35f83c971e4a76a8b2fe332f9eeecb88
SHA1:
a033ef9e77341dda4198f58a57a275412622a1df
SHA256:
2232F5F143BAE4723D2D47DB46B1345514CF97538A5FC5028BF142DE9188416A
File Size:
282.62 KB, 282624 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.File Traits
- HighEntropy
- No Version Info
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 212 |
|---|---|
| Potentially Malicious Blocks: | 40 |
| Whitelisted Blocks: | 167 |
| Unknown Blocks: | 5 |
Visual Map
?
x
x
x
x
?
x
?
x
?
0
?
x
x
0
0
1
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
x
x
0
x
x
x
0
x
x
x
x
0
0
x
0
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0
x
0
x
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\3b4f.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\3ed9.tmp | Generic Write,Read Attributes |