Behavioral task
behavioral1
Sample
94fe4b29ccc16d73ebea55a83e742e5b0a7231a5fc62f5ab33bc7dad3413f363.exe
Resource
win7-20230220-en
General
-
Target
94fe4b29ccc16d73ebea55a83e742e5b0a7231a5fc62f5ab33bc7dad3413f363
-
Size
3.1MB
-
MD5
1145fc073c26ca9ab6a78d9c7c1faf2c
-
SHA1
7cc1eef3a73566d1f134bb270f1bfbe8f9b588c8
-
SHA256
94fe4b29ccc16d73ebea55a83e742e5b0a7231a5fc62f5ab33bc7dad3413f363
-
SHA512
b4bcc89b362571c59071dc5ed177aa87c7248a57b2acb3b8311e4c47001ba57084c2c419de4ca26b1e4eefabf22a438a342bd0273c29e521e6f5124ef8930ec5
-
SSDEEP
49152:3VQkN2zF9+d+j/wNEI31HCOohiId4/VmyUMlPw6rEDCEfihhmDT+E2Wt6ym++:lwCa/wNdFH/ogI6/VV3lYUUi6DT+68
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 94fe4b29ccc16d73ebea55a83e742e5b0a7231a5fc62f5ab33bc7dad3413f363
Files
-
94fe4b29ccc16d73ebea55a83e742e5b0a7231a5fc62f5ab33bc7dad3413f363.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.thnc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_MEM_EXECUTE