fuckyou2
Behavioral task
behavioral1
Sample
dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2.dll
Resource
win10v2004-20230915-en
General
-
Target
dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2
-
Size
1.7MB
-
MD5
a5f44559eba99b5fb5e6a85685fb8f50
-
SHA1
aaefe0e99b4b396b6b15b3f17e1aaecfa13ceaa6
-
SHA256
dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2
-
SHA512
21244e2ba9b3b9faca08db93f44736aad7b0bc9c1900b02867eef2b7dc828922dbf36c742671544a58916ceaf64bfe45a6113a020ad8eb2f432d46edbd902f2d
-
SSDEEP
24576:5B3bcqAV6PWaxztXrKcMoGlPQmcYz2NOSfW69KAdSGzQ/giL8CTNb1oLf:5e6DztbDMnlPQmcVfW69UAC/8C1CLf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2
Files
-
dff36997fd10d1c8b9f19bdd15646a875359e19ec1a33cdfdff832cf4d93d9c2.dll windows x86
404256fdf290a597c5977f51fcfb0b88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetWaitableTimer
RtlMoveMemory
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
ReadFile
GetFileSize
CreateFileA
WriteFile
WritePrivateProfileStringA
GetTickCount
WaitForSingleObject
CreateProcessA
GetStartupInfoA
CopyFileA
Sleep
DeleteFileA
GetLocalTime
CreateDirectoryA
FindClose
FindNextFileA
RemoveDirectoryA
FindFirstFileA
GetModuleFileNameA
CreateWaitableTimerA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcess
lstrcpyn
Process32Next
CreateToolhelp32Snapshot
InterlockedDecrement
GetOEMCP
FlushFileBuffers
SetStdHandle
GetACP
GetCPInfo
CloseHandle
Process32First
GetCommandLineA
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
user32
MsgWaitForMultipleObjects
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
PeekMessageA
GetMessageA
ExitWindowsEx
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
shell32
SHGetSpecialFolderPathA
wininet
InternetCheckConnectionA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
shlwapi
PathFileExistsA
Exports
Exports
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ