acet
ȡjmp��ת
Behavioral task
behavioral1
Sample
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588.dll
Resource
win10v2004-20230220-en
Target
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588
Size
1.2MB
MD5
78799835749f617477be3bb34c0acf92
SHA1
c9ac4980f077aeec6fb6e5e64e86b17b39a49e03
SHA256
5d9d989fb467ed959f06b797fa2883c5399d9a839722cc46552570b1bfb0b588
SHA512
afa0e4435b40518a876adb65e6beca36aaad97474b3ed586356c19a648e0535eebc8b9e0a196b36fb5f1b69eaa4fb92f1a48e36b3e984af76d50f35b20a1d68e
SSDEEP
24576:p4rnKiBoHQRGi4w3CIqzT3wzHjf6cCdJWSJreEgdm+I9J2lQJssT6IJ+04BXvqiC:p4ONHxZwyIc3wv6dNkZdZi2lQ+smIJUy
Processes:
resource | yara_rule |
---|---|
sample | family_blackmoon |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
VirtualProtect
RtlMoveMemory
IsBadReadPtr
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetCurrentProcess
VirtualProtectEx
CreateThread
WaitNamedPipeA
CreateFileA
WriteFile
GetModuleHandleA
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
IsBadCodePtr
ExitProcess
lstrcpynW
VirtualAllocEx
VirtualFreeEx
FlushInstructionCache
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
GetModuleFileNameA
Sleep
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
DeleteCriticalSection
OpenProcess
LoadLibraryExA
GetCurrentProcessId
MessageBoxA
GetMessageA
PeekMessageA
FindWindowA
SendMessageA
wsprintfA
TranslateMessage
DispatchMessageA
PathFileExistsA
WTSSendMessageA
_stricmp
atoi
_ftol
sprintf
floor
_CIfmod
modf
free
malloc
strrchr
strchr
realloc
??3@YAXPAX@Z
memmove
strncmp
__CxxFrameHandler
acet
ȡjmp��ת
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ