Behavioral task
behavioral1
Sample
b91bf41cd091e0a148e9039aca468a968ec9acdbf176dc414a79801901cbd3a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b91bf41cd091e0a148e9039aca468a968ec9acdbf176dc414a79801901cbd3a9.exe
Resource
win10v2004-20220812-en
General
-
Target
b91bf41cd091e0a148e9039aca468a968ec9acdbf176dc414a79801901cbd3a9
-
Size
2.0MB
-
MD5
74048487df2f74e45f1fa634e6836418
-
SHA1
c4e6011583e50870a857ad5001256626fcf1ce96
-
SHA256
b91bf41cd091e0a148e9039aca468a968ec9acdbf176dc414a79801901cbd3a9
-
SHA512
84f3a4f5a32dc86a53a48a0169f2e3787705df4dd4c12372367d7f0da4ce3b8e1dadb4b5281c4da8b14684227a3c869e5a27b272aeee31f99c9bad22e5cf48ca
-
SSDEEP
24576:9qYt+sqxub0S322FjqI8sFQqdxKucEUh5pYCvGwQpYummumK2ummum:93+wnzPKf7xv4fmJm2mJm
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
b91bf41cd091e0a148e9039aca468a968ec9acdbf176dc414a79801901cbd3a9.exe windows x86
5b043760cf0fc6cb62c742c4ce27bf12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord42
shlwapi
PathFileExistsA
kernel32
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
WaitForSingleObject
CreateProcessA
GetStartupInfoA
Sleep
FindNextFileA
FindFirstFileA
FindClose
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
WriteFile
CreateFileA
GetTickCount
SetFileAttributesA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
GetOEMCP
GetProcessHeap
RtlMoveMemory
MoveFileExA
SetWaitableTimer
CreateWaitableTimerA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
GetACP
GetCPInfo
GetCommandLineA
GetVersion
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
LCMapStringW
VirtualAlloc
user32
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMenuInfo
SetMenuInfo
TrackMouseEvent
MsgWaitForMultipleObjects
GetMessageA
shell32
DragAcceptFiles
Shell_NotifyIconA
DragFinish
DragQueryFileA
advapi32
RegSetValueExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegFlushKey
RegQueryValueExA
RegEnumValueA
RegCloseKey
RegCreateKeyA
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ