Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2023 07:19
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
29KB
-
MD5
03420503492876831fe357bab392ca17
-
SHA1
d3ca0ff647471f9ba82db7ffbe1666532d1a6295
-
SHA256
d9ffc2f3a4b9d8241db6318ee0f365862f499e041af2fc615a08b0680f265fe1
-
SHA512
2e48f798f1c4d2c3e1cbd34eca1c724fdea962354f9222ab357d238770ed329ef1fd743f45c4bbe3364742b40b05ad5aab6d2f7c7d4ab47a3dc9ad654a0c3282
-
SSDEEP
768:lk8fRyRdrZUoovLBTf2dxW4xHnPgvM0d:lk8fyrkvL10DxoE
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4564-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/4564-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4564-134-0x0000000000400000-0x0000000000427000-memory.dmp upx