mymain
Behavioral task
behavioral1
Sample
d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8.dll
Resource
win10v2004-20231023-en
General
-
Target
d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8
-
Size
272KB
-
MD5
15e7310e466a538b65de297044aad806
-
SHA1
a17de8d7af8bdde9893b6c33e98ec7b0ec62ccc2
-
SHA256
d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8
-
SHA512
dc239737e103bb14e53eb4a02801d6791182479c779d6a9f5add7ba98c6bb632c49f2c7306be2bccc71b8ebcc63241f0e9955b67af6fb2acb8d12a93258bc72a
-
SSDEEP
3072:GmK9Id7f51iXkYTBcF+sw4tpczVCw4+50VCVNZIP4JBoAQQwfl9ZqOXHtlaUexq:GH9INf5E9yhezN4+50VCqPaBof/L
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8
Files
-
d3ec6b2d29843131aa9e9498fcb34f4830775cedc6317ba1db36148d6274e6f8.dll windows:4 windows x86
0aa1a5f0906751124e82bc4d53b17dee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Process32First
Process32Next
RtlMoveMemory
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CreateFileA
CloseHandle
WriteFile
GetTickCount
GetModuleFileNameA
GetPrivateProfileStringA
ReadFile
GetFileSize
SetFilePointer
GetEnvironmentVariableA
FindClose
FindFirstFileA
FindNextFileA
CreateProcessA
GetStartupInfoA
GetCommandLineA
FreeLibrary
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
LCMapStringA
Module32Next
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
RaiseException
Module32First
CreateToolhelp32Snapshot
lstrcpyn
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetCurrentProcessId
ResumeThread
WaitForSingleObject
VirtualProtectEx
SetWaitableTimer
CreateWaitableTimerA
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentStringsW
GetEnvironmentStrings
TerminateProcess
OpenProcess
CreateThread
DeleteCriticalSection
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
IsWindowVisible
GetWindowThreadProcessId
MsgWaitForMultipleObjects
GetClassNameA
GetMessageA
SetTimer
EnumChildWindows
TranslateMessage
DispatchMessageA
EnumWindows
GetWindow
GetWindowRect
MessageBoxA
GetWindowTextA
PeekMessageA
wsprintfA
wininet
InternetReadFile
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetOpenA
HttpQueryInfoA
advapi32
RegCloseKey
CryptCreateHash
CryptReleaseContext
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptAcquireContextA
shlwapi
PathFileExistsA
ws2_32
WSACleanup
inet_ntoa
WSAStartup
gethostbyname
Exports
Exports
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 636B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ