Behavioral task
behavioral1
Sample
49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5.exe
Resource
win10v2004-20230915-en
General
-
Target
49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5
-
Size
2.5MB
-
MD5
3c14ea17aa746f48f9535f86beaed1e1
-
SHA1
c4f886ec3431c32023d6077d9dadb49060c8fe2c
-
SHA256
49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5
-
SHA512
af7e87501b16e8c0b5938b75573a0e07dfbe37a7f3d0156aa60b7b7fa3e2e78751d1574ea9be0dc2c8848a0c8651d228bece1b1c52fa1503be310c6508da3952
-
SSDEEP
49152:Tl3H8Gk0iOCHXWSBPM1xJ2qQLOJN3UrdH+jitonxyRFHZ8njBu+Y79s:t8vOlSM13XP3Url+jitYxybZ8jSs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5
Files
-
49cc9e9fa12950e14101a6243e3f2485050c71dbdd8a17065ddf645de622bfa5.exe windows:4 windows x86
3572ec15a2f5fc74219bb937c6f4018d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
CloseHandle
WriteFile
CreateFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
HeapAlloc
LCMapStringA
ExitProcess
GetProcessHeap
DeviceIoControl
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
GetTickCount
CreateToolhelp32Snapshot
FlushFileBuffers
Sleep
LoadLibraryA
CreateThread
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
user32
GetWindowTextA
GetParent
GetClientRect
GetWindowThreadProcessId
FindWindowExA
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
GetTokenInformation
OpenProcessToken
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ