Behavioral task
behavioral1
Sample
c53e654027dbfe8086ef21c4fc59d7f78b44bbe1a4d8cf9404d900b1f8f985ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c53e654027dbfe8086ef21c4fc59d7f78b44bbe1a4d8cf9404d900b1f8f985ae.exe
Resource
win10v2004-20221111-en
General
-
Target
c53e654027dbfe8086ef21c4fc59d7f78b44bbe1a4d8cf9404d900b1f8f985ae
-
Size
298KB
-
MD5
9e7551d46008dc7c6f741892eae248dd
-
SHA1
64bd42d0f98dcea9c6133007dac7d5514835f287
-
SHA256
c53e654027dbfe8086ef21c4fc59d7f78b44bbe1a4d8cf9404d900b1f8f985ae
-
SHA512
dcf059f5e0f6d9f4efccc68fd9ddfb802d5b317d175846ea7d35c436ce3d152af1063492e646d2d89fa920f4ae8f3d025150342fac00840286883143c75af0ea
-
SSDEEP
3072:KfD+2PkjjMzuI/CbOI6MsQpcNJ37ocaz/sSbjMZCmyKPqL5dHp5d5PT2soe:4DJPk3bI/Cb/aDp7ocGlAg7KPeHHoe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
c53e654027dbfe8086ef21c4fc59d7f78b44bbe1a4d8cf9404d900b1f8f985ae.exe windows x86
1def198d0fd59b607fb01174b610ad44
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
UnregisterClassA
PeekMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
CreateWindowExA
SetFocus
DefWindowProcA
SendMessageA
PostQuitMessage
DestroyIcon
RemovePropA
GetPropA
RegisterClassExA
SetPropA
kernel32
GetTickCount
GetProcAddress
FreeLibrary
GetCommandLineA
LCMapStringA
GetFileSize
WriteFile
MoveFileA
CopyFileA
DeleteFileA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
CompareFileTime
DosDateTimeToFileTime
CreateFileA
GetFileTime
CloseHandle
LocalSize
SetLastError
CreateThread
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
lstrcpyA
GetProcessHeap
GetModuleHandleA
ExitProcess
LoadLibraryA
shlwapi
PathFindFileNameA
PathMatchSpecA
PathFileExistsA
PathRemoveExtensionA
PathFindExtensionA
PathAppendA
PathRemoveFileSpecA
gdi32
CreateFontA
DeleteObject
shell32
SHGetFileInfoA
comdlg32
GetOpenFileNameA
msvcrt
strrchr
strchr
modf
memmove
_stricmp
_ftol
atoi
strncpy
??3@YAXPAX@Z
strncmp
malloc
free
sprintf
_strnicmp
__CxxFrameHandler
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE