dll_run
Behavioral task
behavioral1
Sample
647fb89a9b1621363dd9ca35d73bbf65e2dab57854d4f90e1555f0d66231e7f4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
647fb89a9b1621363dd9ca35d73bbf65e2dab57854d4f90e1555f0d66231e7f4.dll
Resource
win10v2004-20220901-en
General
-
Target
647fb89a9b1621363dd9ca35d73bbf65e2dab57854d4f90e1555f0d66231e7f4
-
Size
1.1MB
-
MD5
063f68ad0710dc44b55f6afd1a8d9950
-
SHA1
bae52b5f8d1a6c677c062d9b5e21a31aaffeabb7
-
SHA256
647fb89a9b1621363dd9ca35d73bbf65e2dab57854d4f90e1555f0d66231e7f4
-
SHA512
dfade2e7bd0155589419d64defd9133e11c89ed1f5f076406fb7b7b49e8dd4a893273839f0d8d8a081eef649885023bd179ab9fb3e654cf44b807ad96d1235fb
-
SSDEEP
1536:tOGC0lvO/1jNOTyoIUqf6E1sFwXb+Pf6btjNjNn:tRCoCNCPYXb+qbtD
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
647fb89a9b1621363dd9ca35d73bbf65e2dab57854d4f90e1555f0d66231e7f4.dll windows x86
af27659fe716928dcd077a859df4f5a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetPrivateProfileStringA
WriteFile
CreateFileA
GetCommandLineA
LCMapStringA
CreateProcessA
WaitForSingleObject
CloseHandle
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
ExitProcess
GetModuleHandleA
GetProcessHeap
GetStringTypeW
GetVersion
InterlockedDecrement
InterlockedIncrement
RtlUnwind
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
GetProcAddress
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
LCMapStringW
RaiseException
VirtualAlloc
IsBadWritePtr
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetStringTypeA
advapi32
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
user32
MessageBoxA
wsprintfA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ