run
Behavioral task
behavioral1
Sample
b11aa1c2f217c3045d434b4f2a0fdac882c428effde66aafa1bd4e17a8f1c4ed.dll
Resource
win7-20220812-en
General
-
Target
b11aa1c2f217c3045d434b4f2a0fdac882c428effde66aafa1bd4e17a8f1c4ed
-
Size
80KB
-
MD5
d9f91481c5146020180ad5136f9f8e31
-
SHA1
33fd200fe28f03c24b7b98f3f88501c0fa1d7155
-
SHA256
b11aa1c2f217c3045d434b4f2a0fdac882c428effde66aafa1bd4e17a8f1c4ed
-
SHA512
7e45922252f9dedb3ed8d17c6c8628c1777b99d95de5de754ffc8b3cadd8e03f51b5c838a8aa3649c7bf175c551898af964d0feded29784c08f91bc60cae9856
-
SSDEEP
768:8doF/PjJaIm//39QqUHBNadrwa2edb9HmZELLsdbIWRWeFWxZ:fDm/P9xUH6dr52edb9G4iSxZ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
b11aa1c2f217c3045d434b4f2a0fdac882c428effde66aafa1bd4e17a8f1c4ed.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
g.�0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
g.�1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
g.�2 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE