PUP.Rostpay.A

Analysis Report

General information

Family Name: PUP.Rostpay.A
Packers: UPX!
Signature status: Self Signed

Known Samples

MD5: fcbf9a1f4cf84a54a6774101af8e98f8
SHA1: e9e497f4e2b8fab9b5b39df2c535e6e849b99e32
SHA256: 7B3520818A295BE7E6B8DBDE0F318C1F8CF9F923838474186AC38D603941A010
File Size: 941.08 KB, 941080 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Carambis (MEDIA FOG LTD.)
File Version 1.0.0.2
Internal Name Carambis Installer
Legal Copyright Carambis (MEDIA FOG LTD.) All rights reserved. 2014
Original Filename Carambis Installer
Product Name Carambis Installer
Product Version 1.0.0.2

Digital Signatures

Signer Root Status
ROSTPAY Starfield Secure Certificate Authority - G2 Self Signed

File Traits

  • imgui
  • Installer Version
  • packed
  • x86

Block Information

Total Blocks: 11,077
Potentially Malicious Blocks: 330
Whitelisted Blocks: 10,710
Unknown Blocks: 37

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 ? 0 0 0 0 0 0 x 0 x x x x x x x 0 0 x 0 x 0 x x x x 0 x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 ? 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 1 0 1 0 0 0 0 x 0 0 0 0 1 0 0 0 0 0 1 1 0 1 0 x x 0 0 0 x x x x 0 0 0 x x 0 0 x x x 0 0 0 0 x x 0 0 x x ? ? 0 ? x x 0 0 x x x x x x 0 x x 0 x 0 0 0 x x x 0 0 0 x 0 0 x 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 x 0 0 0 x 0 x 0 0 0 0 0 x 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 x x x 0 0 0 0 0 0 0 x 0 0 x 0 0 0 x x x 0 x x 0 0 x 0 0 x 0 x x 0 0 x 0 0 0 x 0 0 0 0 0 x 0 x 0 0 x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 x x x 0 0 0 x x 0 0 0 0 0 x 0 x 0 x x x x 0 x x 0 x 0 x 0 0 0 0 0 0 0 1 1 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x 0 x x 0 0 0 x x 0 0 0 0 0 0 x x 0 0 0 x 0 0 0 0 0 0 x 0 x 0 x x 0 0 0 0 0 0 x 0 x x 0 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 0 0 0 x 1 1 1 0 0 0 x 0 0 x 1 0 x x 0 0 0 0 0 0 x 0 0 x 1 1 1 x 0 0 x 0 x 0 x x x x 0 0 0 0 0 0 x x x 0 x 0 x 0 0 0 x 0 0 x 0 0 1 x 0 0 0 x 0 0 x x 0 0 x x 0 x 0 x 0 x x x 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x x 0 0 x 0 x 0 x 0 x 0 x x 0 0 x 0 x x x 0 0 0 0 x x 0 x 0 x 0 0 0 0 0 x 0 0 x x 0 x x x 0 0 0 0 0 0 1 1 0 0 0 x x x x x x x x x x x x 0 x 0 x 0 x 0 0 0 x 0 x x x 0 x 0 0 0 0 x x 0 0 0 x x 0 0 0 0 x x 0 0 0 x 0 x x x 0 0 0 0 1 0 0 x 0 0 0 x 0 0 x x 0 x x x 0 x x x x x x x 0 x x 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 x 0 x x 0 0 x x 0 x x 0 0 0 0 x 0 0 0 0 x x 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 x x x x x x x x 0 x x 0 0 0 0 0 x 0 0 0 0 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Network Winsock2
  • WSAStartup
  • WSAttemptAutodialName
Network Winsock
  • freeaddrinfo
  • getaddrinfo

Trending

Most Viewed

Loading...