Behavioral task
behavioral1
Sample
0fa0b86eb22144exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0fa0b86eb22144exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
0fa0b86eb22144exeexeexeex.exe
-
Size
335KB
-
MD5
0fa0b86eb221442efd8e18af6d9d56ba
-
SHA1
0d1a284803e7a9f58846997f4facb0e67ae5e7ee
-
SHA256
de6345b4fb40447927e33430cfdcc95a5d21e5db94ffcf971435f8a8d6531f1a
-
SHA512
591cbbb3e598109fca3c5005fdfee38c1d7c78ebcf22a95cb5145dcfd95b78d47fb83db52250883feb2fcea7c1df1dd11b2a3dccb3350192c39c8bd9425fbb97
-
SSDEEP
6144:7tDkI51s/1MH6gDBGpvEByocWeWBkEt0PfaH3T5CTL98vy7anEvY8hEvM1kiXolC:7tDkI5O/1MHOvEIfRfaXNCTL98vy7an4
Malware Config
Extracted
blackmatter
65.239
Signatures
-
Blackmatter family
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule sample family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fa0b86eb22144exeexeexeex.exe
Files
-
0fa0b86eb22144exeexeexeex.exe.exe windows x86
d2e26e45dcb84f1062f90f29a9cf0faa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
kernel32
LoadResource
WriteFile
CreateFileW
ExitProcess
FindResourceW
GetCommandLineW
GetFileSize
GetModuleHandleW
GlobalFree
SizeofResource
LockResource
ReadFile
shell32
CommandLineToArgvW
msvcrt
_wcsicmp
memcpy
memset
sprintf
strchr
strcpy
strlen
strstr
wcscat
wcscpy
wcslen
wcsrchr
localeconv
_stricmp
_strcmpi
tolower
realloc
malloc
free
strtod
strncmp
imagehlp
CheckSumMappedFile
ntdll
RtlFreeHeap
RtlAllocateHeap
NtClose
RtlImageNtHeader
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 439KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ