Behavioral task
behavioral1
Sample
Trojan-Dropper.Win32.Dinwod.exe
Resource
win7-20240221-en
General
-
Target
Trojan-Dropper.Win32.Dinwod.acqn-0990ba5ac34a176ffe977bb3479d688c15704c46cc4358d1b82611b87b85e71a
-
Size
185KB
-
MD5
6009a47956ac606d7e702f1ced5317e8
-
SHA1
e345fd425606be37ec75a93398c4301edcbe79fa
-
SHA256
0990ba5ac34a176ffe977bb3479d688c15704c46cc4358d1b82611b87b85e71a
-
SHA512
02c154706fda0a8c0ab5d5a8788f2e6ac4b361c484d7cfd8a9e51025bed17c5d866920db5ced19f5425b14ee2e278032af154d79e1cccdf1d5e863543b3c10a4
-
SSDEEP
1536:Eh+zUtBIBU+2Da4lH4Iiue58o/ZDv4GMfcHZIlVKAn5ZAcXeOqbZ6NjkbKGgnoud:GqSe5OmiEoAcCbZ6UKGIoutPYQcsNhx9
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Dropper.Win32.Dinwod.acqn-0990ba5ac34a176ffe977bb3479d688c15704c46cc4358d1b82611b87b85e71a
Files
-
Trojan-Dropper.Win32.Dinwod.acqn-0990ba5ac34a176ffe977bb3479d688c15704c46cc4358d1b82611b87b85e71a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE