Behavioral task
behavioral1
Sample
4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723.exe
Resource
win10v2004-20230915-en
General
-
Target
4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723
-
Size
7.6MB
-
MD5
831e1809fd0c698a45ea6edba2d75780
-
SHA1
465beaefdcace9e9b5d4476e63eb18fc1e4a3e1c
-
SHA256
4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723
-
SHA512
bace4c0829aac6c7fdfb9eed121204c6ccf745ab7c7d4b18e8383a6e26a3ff00cf3c38220fb8088ea0c89827b1b2caf6461acb50dfa91e70914d9e7e3045b27b
-
SSDEEP
196608:qFMpKBD7430ftxI4LL6+OYof/uZrZRMwnYI/H0di:OMgDW0ftTLbq+M+YI/Qi
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723
Files
-
4102f0d2fe91edd1afa08fea154eafb46021517eaed0bac6de8617bd2d54f723.exe windows:4 windows x86
d25251ece27bbf1b015a0aa877893ed2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
GetFileSize
CreateFileA
ReadConsoleA
VirtualProtect
WritePrivateProfileStringA
FindNextFileA
FindFirstFileA
FindClose
SetFileAttributesA
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
LocalFree
LocalAlloc
GetCurrentProcess
CloseHandle
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
WideCharToMultiByte
lstrlenW
GetTickCount
GetCurrentProcessId
FreeConsole
GetLocalTime
IsDebuggerPresent
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
Sleep
GetLogicalProcessorInformation
GetVersion
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
CreateMutexA
GlobalMemoryStatusEx
GetProcAddress
VirtualFree
VirtualAlloc
GetPrivateProfileStringA
SetConsoleTitleA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
GetWindowsDirectoryA
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
gdi32
CreateFontA
TranslateCharsetInfo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
StretchBlt
GetObjectA
GetDIBits
DeleteDC
DeleteObject
GetDeviceCaps
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
user32
GetWindowTextLengthW
GetWindowTextW
FindWindowA
IsWindow
GetAsyncKeyState
FindWindowExA
MessageBoxTimeoutA
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
CreateWindowStationA
MessageBoxA
MsgWaitForMultipleObjects
SendInput
GetParent
CallWindowProcA
CreateWindowExA
GetCursorPos
GetSysColor
LoadBitmapA
RegisterHotKey
ReleaseCapture
ScreenToClient
SendMessageA
SetCapture
UnregisterHotKey
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
wsprintfA
ws2_32
closesocket
socket
inet_addr
htons
connect
send
recv
getsockname
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
shlwapi
PathFileExistsA
shell32
DragAcceptFiles
SHGetSpecialFolderPathA
DragFinish
DragQueryFileA
comctl32
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_EndDrag
ord17
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
ImageList_DragShowNolock
Sections
.text Size: 592KB - Virtual size: 591KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.9MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ