Behavioral task
behavioral1
Sample
7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42.exe
Resource
win10v2004-20231130-en
General
-
Target
7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42
-
Size
12.0MB
-
MD5
0eb8bbc3648ba572598ba23e8823bf71
-
SHA1
040dc422cc45d4eba3c2ce95266c4d8cea5ef071
-
SHA256
7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42
-
SHA512
5d55c5ab495b7dcb1e306e412079987b371ce69c1b1f4e7c0ebad992c9da5ed9c50f7b3f33cf8e71f772f44f6cb3d2735239aa9e7b3c056fecc84dfc10787a15
-
SSDEEP
196608:Gx9epEKOq8T8N3M75YgVfG4fYsAh+qGAxUA2U+nPLuMo5V7vEQe:GxkENq4MMF/Vu4wsAh6OU7Umju17N
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42
Files
-
7acc1244bb3b2d628f7b6b6c3ac443a6a802c231f1abb0456ca7baf1ff2d4f42.exe windows:4 windows x86 arch:x86
84a0c7f80e341ebf05f3983675bc98b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
DeleteFileA
FindNextFileA
FindFirstFileA
FindClose
GetModuleFileNameA
GetTickCount
WriteFile
CreateFileA
SetFileAttributesA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetLogicalDriveStringsA
ReadFile
GetFileSize
CopyFileA
MoveFileA
RemoveDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
RtlMoveMemory
lstrcpyn
CreateDirectoryA
CloseHandle
GetSystemDirectoryA
GetTempPathA
OpenProcess
Sleep
GetCurrentProcessId
user32
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
GetMessageA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteA
SHGetSpecialFolderPathA
psapi
GetProcessImageFileNameA
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
msvcrt
_stricmp
floor
_CIfmod
sprintf
srand
rand
free
malloc
strrchr
_ftol
strchr
atoi
realloc
modf
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11.9MB - Virtual size: 11.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ