Behavioral task
behavioral1
Sample
c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804.exe
Resource
win10v2004-20230915-en
General
-
Target
c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804
-
Size
5.4MB
-
MD5
a20c8c822db495cc78b57916b9ab69a9
-
SHA1
1c7d685af88550483ff5519d58e383d60152ba18
-
SHA256
c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804
-
SHA512
b6c62379b7fd8ab8e9a7b6acc64769739df01d1f8bceebbcee995d1b07db39610cad70b152b6f92bf3a3e6377be285159d2d5d76c56022953ec8101e4bf2173d
-
SSDEEP
98304:eLXwbTaMkxkeyaiVWd3BAoAC/9+D8bjC7w5KmA8vYn1FSWp65NlDTZ7Q:eTwbTGubakm1x9+objC85KmA86LEl7Q
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804
Files
-
c8727d55cd1b9df4000c3a6008e0d1876264dd360dbf5631a4b639d79700b804.exe windows:4 windows x86
40069d7d9620efaf161c366cfaaab311
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
WideCharToMultiByte
GetUserDefaultLCID
DeleteFileA
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
GetVersionExA
GetTickCount
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleA
OpenMutexA
VirtualFreeEx
VirtualAllocEx
GetCurrentProcess
MultiByteToWideChar
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
DeviceIoControl
Process32Next
CloseHandle
lstrlenA
Process32First
CreateToolhelp32Snapshot
CreateFileA
RtlMoveMemory
HeapAlloc
GetProcessHeap
CreateMutexA
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
MessageBoxA
wsprintfA
advapi32
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
DeleteService
ControlService
OpenServiceA
OpenSCManagerA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
wininet
HttpQueryInfoA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetOpenA
msvcrt
__CxxFrameHandler
strncmp
memmove
modf
realloc
_atoi64
strncpy
malloc
free
sprintf
atoi
_ftol
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
srand
rand
strchr
strtod
_CIfmod
ole32
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
oleaut32
VariantInit
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
SafeArrayGetDim
RegisterTypeLi
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.3MB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE