Behavioral task
behavioral1
Sample
41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72.exe
Resource
win10v2004-20230621-en
General
-
Target
41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72
-
Size
233KB
-
MD5
f7c625d7263c18ecc8168c219dc9724c
-
SHA1
d2420a7a7e230efb3a7747c82cc6c45cac439a1f
-
SHA256
41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72
-
SHA512
78844189eba5420cdcf0ed13fb65cfd1a0fdafffd25fde409a376b49143910fa7ad2c367499e7beb70f872aea3172cabf909dd7ce312598177c648f9b7f8ae90
-
SSDEEP
6144:t5/xaoPuPKgyVX1e6IreazzIb4iue7G2r:t7a4lJ1e6IrotG2r
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72 -
NSIS installer 1 IoCs
Processes:
resource yara_rule sample nsis_installer_2
Files
-
41ff2b0d6c9ad76caeea7221077e28f04480af7338ad724f5bbf7aec3f8a7f72.exe windows x64
d73816ed1336b201c60cbf89a9624ab5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
CreateFileA
LockResource
CloseHandle
LoadResource
ExitProcess
CreatePipe
GetTempPathA
FreeResource
lstrlenA
FindResourceA
WriteFile
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SizeofResource
GetModuleFileNameA
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LoadLibraryW
GetProcAddress
FreeLibrary
GetStartupInfoW
WaitForSingleObject
DeviceIoControl
GetVolumeInformationA
CreateFileW
CreateProcessW
Sleep
ReadFile
user32
MessageBoxA
advapi32
RegSetValueExA
RegGetValueA
RegCloseKey
RegOpenKeyExA
ws2_32
connect
socket
send
recv
htons
WSACleanup
closesocket
WSAStartup
inet_pton
iphlpapi
GetAdaptersInfo
vcruntime140
__current_exception
strstr
memcpy
memset
memcmp
__C_specific_handler
__current_exception_context
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
terminate
_exit
_initialize_onexit_table
__p___argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
_register_onexit_function
__p___argc
_register_thread_local_exe_atexit_callback
_c_exit
_configure_narrow_argv
_initterm
_seh_filter_exe
_initterm_e
_cexit
exit
system
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vfprintf
__acrt_iob_func
__stdio_common_vsprintf
__p__commode
api-ms-win-crt-string-l1-1-0
strcat_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
calloc
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-utility-l1-1-0
srand
rand
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ