����
Behavioral task
behavioral1
Sample
cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67.dll
Resource
win10v2004-20230703-en
General
-
Target
cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67
-
Size
240KB
-
MD5
131420ad3f0de55d22c2d300da71ddb8
-
SHA1
0b78b70360befd522530e3bb12a2244eabadb088
-
SHA256
cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67
-
SHA512
f41388239c5b65703f9f730b3f2668e5274ca6d7d1fab7fde69dbd97d1e5cf238929c5a998c8193197ca126de56b1c0097543bbd1f2a1e2b45fa73ff1b4e0a5b
-
SSDEEP
3072:mtrsyASWGtZw+T0PhaRKhFH0VaWVfjdjPGLXJX+KFjA6Ftqbo4:mtrsyASBWfQRKhFAaWVLdrGLXtA6C
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67
Files
-
cdaebb5fbb55c3f971dcb13a7a8b41da9e4e6bca643a5abcdbed63fbe52c4a67.dll windows x86
14cf6d756f4ea4c9bc056cbd772fa433
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
GetTickCount
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetProcessHeap
WideCharToMultiByte
VirtualProtect
VirtualAllocEx
GetCurrentThreadId
IsBadWritePtr
VirtualProtectEx
RtlMoveMemory
IsBadReadPtr
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
Sleep
CreateThread
FreeEnvironmentStringsW
FreeEnvironmentStringsA
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
user32
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
SendInput
MapVirtualKeyA
SetFocus
AttachThreadInput
GetWindowThreadProcessId
IsWindow
SendMessageA
GetAsyncKeyState
SetWindowLongA
PostQuitMessage
PostMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowPos
ShowWindow
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
DestroyMenu
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetObjectA
GetStockObject
CreateBitmap
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
oleaut32
VariantTimeToSystemTime
Exports
Exports
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ