Behavioral task
behavioral1
Sample
89d866d57d0a14be9d40d98297d17928f7679c243b293c4ed781e42932ac8998.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89d866d57d0a14be9d40d98297d17928f7679c243b293c4ed781e42932ac8998.exe
Resource
win10v2004-20221111-en
General
-
Target
89d866d57d0a14be9d40d98297d17928f7679c243b293c4ed781e42932ac8998
-
Size
180KB
-
MD5
68d1e7b849b7677e8f100c6f4474b38c
-
SHA1
78bb904c0883608e93b018d39705c2267aac0b85
-
SHA256
89d866d57d0a14be9d40d98297d17928f7679c243b293c4ed781e42932ac8998
-
SHA512
f71fc65a44415633298bbf37cb3be75518dda86e00b7a312a87f88ea675f837f7dc630384ec65de0cea698d9209242bcb97cf77872fe8e807849f388e2d2872a
-
SSDEEP
768:Czx4oPqu1t1dEdo2GutgDPD06ojXIeze7kcG/t9uvrX0o42nPsVyMa1H:C1Pq6d52HtgDPDSX1zug4bzn6yM2H
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
89d866d57d0a14be9d40d98297d17928f7679c243b293c4ed781e42932ac8998.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
31RLRLI0 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0O2vdJB7 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE