Static task
static1
Behavioral task
behavioral1
Sample
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
Resource
win10v2004-20220310-en
General
-
Target
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.dmp
-
Size
336KB
-
MD5
c9d522b650a08a5ac3374240cd7e4da3
-
SHA1
dc0b9124cad566be7b5e65f2528d8300b1040007
-
SHA256
a49fd25b00e8ef3240caec0ccb08d0f0da1e4b5779f611c030df80b13f7ead11
-
SHA512
b2e84b9bd22165307deb188695be15252c3974633c054d6ef9dd908f956f7564d48a62760f70c1fbfed5d25cd32d5bf0c6085025340b1e89fe4da6b8446a164f
-
SSDEEP
6144:hNp8XbSI/ENVoBJZUIm8/wXAGepw5A7n3mLn:h7vNVsZU70GMwkn0
Malware Config
Extracted
blackguard
https://umpulumpu.ru/
Signatures
-
Blackguard family
Files
-
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ