fuckyou2
Behavioral task
behavioral1
Sample
a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94.dll
Resource
win10v2004-20230824-en
General
-
Target
a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94
-
Size
1.7MB
-
MD5
c7f3063fed72380ffebd765966e91332
-
SHA1
be48373b0eb201960c4527509136d61f4d968e7c
-
SHA256
a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94
-
SHA512
9ca33dc3236133a973113a921d9f07af129098a17cbca1b429d660f8dc8513acaf1866ee646f458d123066e8bc9cd01a9562a1dcf40f5b4d6f9f04f16212f751
-
SSDEEP
24576:Rq51Km02vVVA38EKI4m4bKdIV1Yrd7KRvHOLO1z2NOSfW69KAdSGzQ/giL8CTNbw:R5338dIz4bxKOufW69UAC/8C1CLf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94
Files
-
a96114a18fb27e0d8ba158219a65268d6b327aa74cdaed0fb7f1bfbf4cc9ea94.dll windows x86
404256fdf290a597c5977f51fcfb0b88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetWaitableTimer
RtlMoveMemory
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
ReadFile
GetFileSize
CreateFileA
WriteFile
WritePrivateProfileStringA
GetTickCount
WaitForSingleObject
CreateProcessA
GetStartupInfoA
CopyFileA
Sleep
DeleteFileA
GetLocalTime
CreateDirectoryA
FindClose
FindNextFileA
RemoveDirectoryA
FindFirstFileA
GetModuleFileNameA
CreateWaitableTimerA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcess
lstrcpyn
Process32Next
CreateToolhelp32Snapshot
InterlockedDecrement
GetOEMCP
FlushFileBuffers
SetStdHandle
GetACP
GetCPInfo
CloseHandle
Process32First
GetCommandLineA
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
user32
MsgWaitForMultipleObjects
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
PeekMessageA
GetMessageA
ExitWindowsEx
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
shell32
SHGetSpecialFolderPathA
wininet
InternetCheckConnectionA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
shlwapi
PathFileExistsA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ