Behavioral task
behavioral1
Sample
18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6.exe
Resource
win10v2004-20231020-en
General
-
Target
18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6
-
Size
868KB
-
MD5
6f4ce616cabbbfad7178917cc5b90586
-
SHA1
af3455b608768f1e8ee50173f3cfccd1a2e879c7
-
SHA256
18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6
-
SHA512
d8863ec9da7ea59942d786b63043a5d123f84e7b447a2097bfab6944d2c513d4410b7f43e48ccb9ed034062ac9130775695274881f04538170d7cfa97aab3084
-
SSDEEP
24576:WJ+HuaaLfisISqXcjgZxxSzRnup9d9DtyBaMN2+s:WraaLfisI9nSzVUd9Ku+s
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6
Files
-
18f937d4b8e599aa3afda1b47108add58090ae2679923e6b9144170f9d29ffc6.exe windows:4 windows x86
111f4b0829374d9eebb7ef4a2d98cf04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
GetCurrentThreadId
CreateWaitableTimerA
SetWaitableTimer
lstrcpyn
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetPrivateProfileStringA
CreateDirectoryA
WriteFile
CreateFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrlenW
GetTickCount
Process32Next
Process32First
FlushFileBuffers
SetStdHandle
LCMapStringW
SetUnhandledExceptionFilter
InterlockedIncrement
CreateToolhelp32Snapshot
IsBadCodePtr
CreateEventA
OpenEventA
CloseHandle
LocalFree
LocalAlloc
InterlockedDecrement
SetFilePointer
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
OpenProcess
LCMapStringA
GetCurrentProcess
LeaveCriticalSection
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
MultiByteToWideChar
GetVersion
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
user32
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
SetActiveWindow
AttachThreadInput
OpenIcon
TranslateMessage
SetWindowPos
GetWindowTextW
GetWindowTextLengthW
GetClassNameA
GetParent
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
GetMessageA
PeekMessageA
IsIconic
advapi32
CryptReleaseContext
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextA
iphlpapi
GetInterfaceInfo
GetPerAdapterInfo
GetAdaptersInfo
mprapi
MprConfigGetFriendlyName
MprConfigServerConnect
oleaut32
VariantTimeToSystemTime
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 772KB - Virtual size: 850KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ