run
Behavioral task
behavioral1
Sample
b67c39195f77e9f6ae5a8faf11d6badbf46e8d8bdba4d0b58b77f807623feff9.dll
Resource
win7-20220812-en
General
-
Target
b67c39195f77e9f6ae5a8faf11d6badbf46e8d8bdba4d0b58b77f807623feff9
-
Size
80KB
-
MD5
6f5876686b5b522acaf62fe5e96576f8
-
SHA1
0db3382da8ab6759b05fc0b3f341274d0fdaa876
-
SHA256
b67c39195f77e9f6ae5a8faf11d6badbf46e8d8bdba4d0b58b77f807623feff9
-
SHA512
ae11bd7cc1383027957cedc03d77f775048d004b692572431fc1c91019b8f52182406a80603a466c3cfcee95c89495b5873064c91965b89145d53e90336faca4
-
SSDEEP
768:0mvT5hPKXIm//39QqUCaNadr8a2sI5ccdmGLkiGuWxZ:XH5m/P9xUCDdrF2s9QZ4xZ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
b67c39195f77e9f6ae5a8faf11d6badbf46e8d8bdba4d0b58b77f807623feff9.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
I3�Y0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
I3�Y1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
I3�Y2 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE