Behavioral task
behavioral1
Sample
Windows.Encryptor.exe
Resource
win10-20231220-en
General
-
Target
Windows.Encryptor.bin
-
Size
66KB
-
MD5
ba375d0625001102fc1f2ccb6f582d91
-
SHA1
379ebd1eff6f8685f4ff72657626bf6df5383d87
-
SHA256
c6e2ef30a86baa670590bd21acf5b91822117e0cbe6060060bc5fe0182dace99
-
SHA512
795b10a638e289729192de6a6d9964b5ad3b8084f84d58da077ca8ec08c8b8cb1acadb5240962d4ccacf66242bab1430923fc77bdbbfacd0badd64df2ba1487f
-
SSDEEP
1536:HzICS4AT6GxdEe+TOdincJXvKvWLBjkl:4R7auJXSOhC
Malware Config
Extracted
blackmatter
1.2
bab21ee475b52c0c9eb47d23ec9ba1d1
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
false
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Signatures
-
Blackmatter family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Windows.Encryptor.bin
Files
-
Windows.Encryptor.bin.exe windows:5 windows x86 arch:x86
Password: infected
c94b1566bf307396953c849ef18f9857
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectPalette
GetTextCharset
GetDeviceCaps
CreateSolidBrush
CreateFontW
user32
DefWindowProcW
GetClassNameW
GetDlgItem
GetDlgItemTextW
IsDlgButtonChecked
LoadImageW
LoadMenuW
CreateMenu
CreateDialogParamW
EndDialog
kernel32
SetLastError
GetModuleHandleA
GetFileAttributesW
GetCommandLineW
GetCommandLineA
FormatMessageW
GetAtomNameW
FreeLibrary
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ