Behavioral task
behavioral1
Sample
80a30d8477f804bbef9b628ad4021132d1ab85c413b58ee6369cb9edec783aed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
80a30d8477f804bbef9b628ad4021132d1ab85c413b58ee6369cb9edec783aed.exe
Resource
win10v2004-20220901-en
General
-
Target
80a30d8477f804bbef9b628ad4021132d1ab85c413b58ee6369cb9edec783aed
-
Size
168KB
-
MD5
cb8827137fbc9543f3ed66fc67321790
-
SHA1
549e04ad71b3b2daa77b8e16fbe52bb048b99f76
-
SHA256
80a30d8477f804bbef9b628ad4021132d1ab85c413b58ee6369cb9edec783aed
-
SHA512
b3c87b80f64ce43317f9fe3b7ff280b4c1047b141f453e1eafada052e099d57ab1b0b1d7681e3c5d588cc1bbd963a5f95fcfc9ffc7c79d76bc01e1984a158aaf
-
SSDEEP
1536:6AVLQTEd6cmhMyl4iYgIPZtfaEKYYrHO05Y98unKNc6xZA4Lt1ZYEF2ZGl/lIzAr:6AVvInnNIPZtf7KvHO05Y9VkJZQGlrr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
80a30d8477f804bbef9b628ad4021132d1ab85c413b58ee6369cb9edec783aed.exe windows x86
6d3700c4e08e81f815c03b342751446b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetModuleFileNameA
CopyFileA
CloseHandle
ReadFile
GetFileSize
IsBadReadPtr
WriteFile
GetCommandLineA
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
CreateFileA
GetProcessHeap
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
GetVersion
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetProcAddress
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
SetFilePointer
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
PeekMessageA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ