Behavioral task
behavioral1
Sample
6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76.exe
Resource
win10v2004-20230915-en
General
-
Target
6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76
-
Size
866KB
-
MD5
4eb6972906a80b6ae8c6460657f2ac65
-
SHA1
a70b3792f9f68420a480c91c6775264ff7d78033
-
SHA256
6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76
-
SHA512
932d6c144e8e264ad0318d52b1cd9a79fc3b6bec957cb2773566ff2af259e54774133552470b41d036bf59419363ad7d2db3f45b1632d717eb6f95f8eac22c2e
-
SSDEEP
24576:wu0EhaJ4YNSh+rXCmxQmg+PB5HzcW2JYC:w7TZQUgdY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76
Files
-
6e56389467f5ad851f301b849baf1ff10c42363b19b6065bfc837d0c0cefeb76.exe windows:4 windows x86
c2fee5185bd098951e868ab90b027014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
DeleteFileA
Sleep
WriteFile
CreateProcessA
GetStartupInfoA
GetUserDefaultLCID
FormatMessageA
GetModuleFileNameA
GetStdHandle
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
GetVersionExA
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
WaitForSingleObject
CreateThread
GetWindowsDirectoryA
DeviceIoControl
lstrlenA
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
CreateFileA
TerminateProcess
OpenProcess
CloseHandle
Process32Next
Process32First
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
CreateMutexA
CreateToolhelp32Snapshot
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
lstrcpyn
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
InitializeCriticalSection
GetVolumeInformationA
GetComputerNameA
GetExitCodeThread
TerminateThread
ReleaseMutex
CreateFileMappingA
GetLocalTime
CreateDirectoryA
ReadFile
GetFileSize
GetVersion
RtlUnwind
GetCurrentProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetFileType
SetHandleCount
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
OpenMutexA
user32
DispatchMessageA
PeekMessageA
wsprintfA
MessageBoxA
GetMessageA
TranslateMessage
GetDesktopWindow
advapi32
OpenServiceA
ControlService
DeleteService
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
StartServiceA
CreateServiceA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
CloseServiceHandle
OpenSCManagerA
dwmapi
DwmIsCompositionEnabled
shell32
ShellExecuteA
shlwapi
PathRemoveFileSpecA
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpSendRequestA
InternetReadFile
HttpOpenRequestA
msvcrt
calloc
__CxxFrameHandler
strncmp
memmove
strncpy
modf
realloc
_atoi64
_CIpow
_CIfmod
strtod
strchr
rand
srand
strrchr
_ftol
atoi
malloc
free
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
ole32
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
Sections
.text Size: 388KB - Virtual size: 387KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 463KB - Virtual size: 513KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE