Behavioral task
behavioral1
Sample
d533b0aa4eade76ca02996326656930ac52a701ab0c7fda8d3257ae12efd83ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d533b0aa4eade76ca02996326656930ac52a701ab0c7fda8d3257ae12efd83ef.exe
Resource
win10v2004-20220812-en
General
-
Target
d533b0aa4eade76ca02996326656930ac52a701ab0c7fda8d3257ae12efd83ef
-
Size
103KB
-
MD5
27fe98353f247140054828af00e1ecb4
-
SHA1
a56080c47c716adaea31631aff81973bbf38aebf
-
SHA256
d533b0aa4eade76ca02996326656930ac52a701ab0c7fda8d3257ae12efd83ef
-
SHA512
daf98bfdec77b01e3b41531b2317688ff47778114d04df85042b4b295bd83e51dde18d26a33375e910ce0f78140ae9b276c6177d8bfd4c5e6e8667a4c5c2b8be
-
SSDEEP
1536:pZGVOafQn1LCIoZ63xbAEf5oBwgDVAUFKaea8pgHdHryl:p4lfQn0ItAG59g5FFeah9Lyl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
d533b0aa4eade76ca02996326656930ac52a701ab0c7fda8d3257ae12efd83ef.exe windows x86
47e19194debdd51228418b7165149834
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CreateDirectoryA
GetModuleFileNameA
CopyFileA
WriteFile
CreateFileA
SetFileAttributesA
GetFileSize
ReadFile
DeleteFileA
GetTickCount
MultiByteToWideChar
GetCurrentProcess
GetModuleHandleA
FindNextFileA
FindFirstFileA
FindClose
SetFilePointer
GetVersionExA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
RtlMoveMemory
GetProcessHeap
GetUserDefaultLCID
ReadProcessMemory
lstrcpyn
TerminateThread
CreateThread
GetLogicalDriveStringsA
CloseHandle
ReleaseMutex
CreateMutexA
WideCharToMultiByte
Sleep
user32
GetWindowTextLengthA
GetWindowTextA
MoveWindow
IsWindowEnabled
CreateWindowExA
SetFocus
CallWindowProcA
SetTimer
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetSystemMetrics
GetParent
GetWindowRect
SetWindowPos
MapWindowPoints
EnableWindow
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
dnsapi
DnsFlushResolverCache
mpr
WNetGetUserA
wininet
InternetConnectA
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetSetCookieA
comctl32
ord17
msvcrt
modf
atoi
strtod
tolower
malloc
memmove
strncpy
rand
strchr
srand
__CxxFrameHandler
realloc
strncmp
_stricmp
sprintf
free
_ftol
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
_strnicmp
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
ole32
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantChangeType
SafeArrayUnaccessData
SafeArrayGetElemsize
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mmym520 Size: 104B - Virtual size: 104B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ