a
Behavioral task
behavioral1
Sample
dea9294a69e0c35f866057c27f9177348454da02ac96eb0d2d4cfd671c8aee9c.dll
Resource
win7-20230703-en
General
-
Target
dea9294a69e0c35f866057c27f9177348454da02ac96eb0d2d4cfd671c8aee9c
-
Size
5.5MB
-
MD5
1426430c076a96028efb1be7b211a8f8
-
SHA1
71a417520e62e927db03543474e2f25d51a9e61f
-
SHA256
dea9294a69e0c35f866057c27f9177348454da02ac96eb0d2d4cfd671c8aee9c
-
SHA512
5c65ad28f1096799be7dd9e9f4be96ebca45cf9a6eb6d5ee7facd92f000e0d53c1ae04a37080b6d4d67464fb1a685149e1172180a4a2aca9da2efd69eb5e5232
-
SSDEEP
49152:wqqw3Ig3FovIOoGfYtsXo7Kq1Ixg28kRNQc6ugHLxfobOftajN5Q+/jsHG3jAy5/:xJ3Fov2Ga7AKBrAN56at6D
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource dea9294a69e0c35f866057c27f9177348454da02ac96eb0d2d4cfd671c8aee9c
Files
-
dea9294a69e0c35f866057c27f9177348454da02ac96eb0d2d4cfd671c8aee9c.dll windows x86
302325be9f703f9afb9b56a7416a8269
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
FindClose
FindFirstFileA
ReadFile
GetFileSize
CreateFileA
IsBadCodePtr
WriteFile
GetTickCount
DeleteFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetPrivateProfileStringA
GetLastError
GetCommandLineA
LoadLibraryA
LCMapStringA
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleHandleW
Process32Next
Process32First
CreateToolhelp32Snapshot
LocalAlloc
CloseHandle
CreateThread
RtlMoveMemory
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
GetModuleFileNameA
lstrlenA
user32
LoadIconA
SetForegroundWindow
SetTimer
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
GetAsyncKeyState
ws2_32
closesocket
recv
connect
inet_addr
socket
WSAGetLastError
WSAStartup
send
htons
advapi32
RegDeleteValueA
RegCloseKey
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
ControlService
QueryServiceStatus
DeleteService
CloseServiceHandle
RegDeleteKeyA
RegOpenKeyExA
msvcrt
realloc
memmove
strchr
atof
strncmp
__CxxFrameHandler
modf
atoi
_ftol
sprintf
srand
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
free
malloc
_CIfmod
rand
shlwapi
PathFileExistsA
Exports
Exports
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.3MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 892KB - Virtual size: 891KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE