Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 12:11
Behavioral task
behavioral1
Sample
0d14f60e19409f2e8a8d73ad9d9a0af7ca50b683e82de8a4774878bb501c98e8.exe
Resource
win7-20230220-en
3 signatures
150 seconds
General
-
Target
0d14f60e19409f2e8a8d73ad9d9a0af7ca50b683e82de8a4774878bb501c98e8.exe
-
Size
13KB
-
MD5
0da1c67f537dd4005ed383619ca55d5e
-
SHA1
4a449d8063f4945955b28fd2e9a4b2d51c2bd856
-
SHA256
0d14f60e19409f2e8a8d73ad9d9a0af7ca50b683e82de8a4774878bb501c98e8
-
SHA512
9cb45a933a4e498b4b5c1663d7323c437c18408ef5425ad478b03e15a43884ed2791e78a61ae0b4ea11fc5a2900f7f2a012f81050f10e9fcc822b86a0fa5f086
-
SSDEEP
384:3tw6PPgrEfvtjRU223rMiGqpZzX02NrNhkzaH4kr9:3tw6PXRr23QiG+XBKBI9
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4368-134-0x0000000000400000-0x000000000041A000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/4368-133-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4368-134-0x0000000000400000-0x000000000041A000-memory.dmp upx