Behavioral task
behavioral1
Sample
4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe.exe
Resource
win10v2004-20231222-en
General
-
Target
4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe.exe
-
Size
370KB
-
MD5
314f5a3bddcc9bf58b39d0dfbf1eb9a0
-
SHA1
b5ed55d097573394901c070e1d505d6325ac767c
-
SHA256
4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe
-
SHA512
d2ab4cc956721ddc7801f90cf579ec9671effbc864cd0a0e283a461ca151af9d30b968d1d3af93a010e67266064fe6cdd3227fe99b7f69df1dc4399f1dfb6623
-
SSDEEP
6144:6YCiJ2gyZ4Mb7PlNyyfIG1kgOnogD/Nn4gU+b2HV70/2wPe1ep1B+wsiS:6YCmq7PlNyyfIG1vKpDlKSrB+wM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe.exe
Files
-
4221eb8d597d1c22338772f3e32ef51f5f682965749a8e435f794c4bc7b492fe.exe.exe windows:4 windows x86 arch:x86
349ea92481de560e969f8d37edf1ee95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GlobalMemoryStatusEx
GetProcessHeap
HeapAlloc
GlobalSize
DeviceIoControl
VirtualAlloc
VirtualFree
GetCurrentProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32First
lstrlenA
CloseHandle
Process32Next
GetLogicalDriveStringsA
QueryDosDeviceA
VirtualAllocEx
VirtualFreeEx
CreateRemoteThread
GetExitCodeThread
GetModuleHandleA
GetProcAddress
ExitProcess
HeapReAlloc
HeapFree
IsBadReadPtr
GetCurrentThreadId
GetPrivateProfileStringA
WritePrivateProfileStringA
ReadFile
GetFileSize
WaitForSingleObject
CreateProcessA
GetStartupInfoA
WriteFile
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
FindFirstFileA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
TerminateProcess
CreateFileA
CreateDirectoryA
Sleep
GetModuleFileNameA
CreateThread
user32
MessageBoxA
GetClassNameA
GetWindowTextA
IsWindowVisible
wsprintfA
TranslateMessage
GetMessageA
SetActiveWindow
AttachThreadInput
SendInput
DispatchMessageA
PeekMessageA
GetWindowThreadProcessId
SetWindowPos
FindWindowExA
MapVirtualKeyA
SetForegroundWindow
advapi32
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteEx
ws2_32
ntohs
WSAAsyncSelect
socket
htons
getsockname
connect
gethostbyname
WSACleanup
recv
send
closesocket
WSAStartup
inet_addr
select
psapi
GetProcessImageFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
wininet
InternetTimeToSystemTime
msvcrt
strstr
malloc
realloc
free
strrchr
modf
strchr
_CIfmod
strtod
_CIpow
floor
rand
srand
sprintf
_ftol
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
shlwapi
PathFileExistsA
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantInit
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantClear
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ