Behavioral task
behavioral1
Sample
4550b4ad33d1df58dec04614871f9048eadfbc219a1fdd16fbf832d7bc97c9a6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4550b4ad33d1df58dec04614871f9048eadfbc219a1fdd16fbf832d7bc97c9a6.exe
Resource
win10v2004-20220901-en
General
-
Target
4550b4ad33d1df58dec04614871f9048eadfbc219a1fdd16fbf832d7bc97c9a6
-
Size
106KB
-
MD5
ba50bc659c38404caf0b1861723ad83b
-
SHA1
92ab6fad4321147ed670517448dfb25f640775bc
-
SHA256
4550b4ad33d1df58dec04614871f9048eadfbc219a1fdd16fbf832d7bc97c9a6
-
SHA512
4f168482809b9d608a0b79642661843733abb1dbd6ccabf68c776b789533b90c6e837e08cf4e71aeedbe4c4fa1693c6232a5203e8578f2d4fbac362164b0c735
-
SSDEEP
1536:DHPaisoc013lwRacN2zgrUzQ5lfuEAw45YyN6C9maUiDExdudVCSlixSpe15FOQH:DP57c2zgwIuXHOpq64qA7M/yxO
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
4550b4ad33d1df58dec04614871f9048eadfbc219a1fdd16fbf832d7bc97c9a6.exe windows x86
1ca76329db205a6ccbbfd19605f042fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
ExitProcess
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
DeleteFileA
CopyFileA
MoveFileA
WriteFile
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrlenW
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
HeapReAlloc
MultiByteToWideChar
lstrlenA
HeapDestroy
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
HeapFree
HeapAlloc
GetProcessHeap
GetTickCount
RtlMoveMemory
GetModuleFileNameA
SetFilePointer
GetModuleHandleA
user32
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
wsprintfA
MoveWindow
GetDlgItem
PostQuitMessage
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
SystemParametersInfoA
AdjustWindowRectEx
TrackMouseEvent
GetClientRect
GetSysColorBrush
GetSysColor
SetWindowLongA
SetWindowPos
ScreenToClient
PeekMessageA
SendMessageA
ShowWindow
DestroyWindow
DefWindowProcW
SetWindowLongW
RegisterClassExW
LoadCursorA
LoadIconA
MessageBoxA
AppendMenuA
CreateMenu
GetWindowRect
SetWindowTextA
DispatchMessageA
GetMessageA
UpdateWindow
CreateDialogIndirectParamA
shell32
DragQueryFileW
DragFinish
SHGetSpecialFolderPathA
gdi32
DeleteObject
SetTextColor
CreateSolidBrush
SetBkColor
SetBkMode
GetStockObject
msvcrt
_ftol
tolower
strncmp
atoi
atof
_atoi64
strncpy
??2@YAPAXI@Z
??3@YAXPAX@Z
_CIfmod
rand
srand
sprintf
strchr
modf
memmove
free
malloc
_strnicmp
__CxxFrameHandler
strrchr
shlwapi
PathFileExistsA
comdlg32
GetOpenFileNameA
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE