fuckyou2
Behavioral task
behavioral1
Sample
NEAS.334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0_JC.exe
-
Size
1.7MB
-
MD5
5d2e49c185412a82e8d256658bfd5e2f
-
SHA1
46c8d9c457bca527fc12a506da6c9baace4ba142
-
SHA256
334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0
-
SHA512
d8407044e1bec4d493daaa9cdc2507731d5263aa0418c27d5f18ba67181f6f3d52667c102bf61752fd32b1c077f86009ef2db7e064167f46874284099c625bcd
-
SSDEEP
24576:SNZcnAV6PWaxztXrKcMoGlPQmcYz2NOSfW69KAdSGzQ/giL8CTNb1oLf:Sp6DztbDMnlPQmcVfW69UAC/8C1CLf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0_JC.exe
Files
-
NEAS.334f94b03bbe45a272ef97187685c0e63dd016bcd41504080ec91131240d9cb0_JC.exe.dll windows:4 windows x86
404256fdf290a597c5977f51fcfb0b88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetWaitableTimer
RtlMoveMemory
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
ReadFile
GetFileSize
CreateFileA
WriteFile
WritePrivateProfileStringA
GetTickCount
WaitForSingleObject
CreateProcessA
GetStartupInfoA
CopyFileA
Sleep
DeleteFileA
GetLocalTime
CreateDirectoryA
FindClose
FindNextFileA
RemoveDirectoryA
FindFirstFileA
GetModuleFileNameA
CreateWaitableTimerA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcess
lstrcpyn
Process32Next
CreateToolhelp32Snapshot
InterlockedDecrement
GetOEMCP
FlushFileBuffers
SetStdHandle
GetACP
GetCPInfo
CloseHandle
Process32First
GetCommandLineA
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
user32
MsgWaitForMultipleObjects
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
PeekMessageA
GetMessageA
ExitWindowsEx
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
shell32
SHGetSpecialFolderPathA
wininet
InternetCheckConnectionA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
shlwapi
PathFileExistsA
Exports
Exports
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ