Behavioral task
behavioral1
Sample
924-54-0x0000000000BD0000-0x0000000000BE7000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
924-54-0x0000000000BD0000-0x0000000000BE7000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
924-54-0x0000000000BD0000-0x0000000000BE7000-memory.dmp
-
Size
92KB
-
MD5
713ff075b572353ea0b1a010a905a16c
-
SHA1
a60f91ac4406925637a6c35bc7cb3ab406edae04
-
SHA256
e44345e64dc202f0226bfcf5c8a77446f9242debffa2d6e8eca14a1613b11794
-
SHA512
5f761d8ce6448bd8223475ab6fa5b43457565449ab268180c59186661e3b971fd7911baecaf7a0bbfb49fd3ee88750d7bcba22533b4834a5217f09410105e519
-
SSDEEP
1536:JzICS4AsDTjbbTDQkrtbiQutp0oiBBehmWMQsZgshYg:ylahutp0NehwzZgsmg
Malware Config
Extracted
blackmatter
1.2
Signatures
-
Blackmatter family
-
resource yara_rule sample upx
Files
-
924-54-0x0000000000BD0000-0x0000000000BE7000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE