General
-
Target
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089
-
Size
11.8MB
-
Sample
240407-ts2a9sgh53
-
MD5
2fb55990daf8b471dd5f3c6297020508
-
SHA1
084b2a241dd211da48e1653f21613bc86e2ad002
-
SHA256
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089
-
SHA512
0dcbf78abdd89a129bf2e7842679c03df62f951658e4aaab3045518209887eb326a142e4e87b2c8f5b43b0685d1fde49dba346634abb1a1133d659fa83b362f6
-
SSDEEP
196608:OIJ6eA5cPmiRqfk0ScX/eBDv+cRc7A4Yn7WILy+aEkcGXe6bqmOIhJZEFIxgabSR:Of1xAcX/Or/M07neRJXe6basrSsgabI
Behavioral task
behavioral1
Sample
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089
-
Size
11.8MB
-
MD5
2fb55990daf8b471dd5f3c6297020508
-
SHA1
084b2a241dd211da48e1653f21613bc86e2ad002
-
SHA256
8674d939f855200da391bccec849d791990d29a676531a082c19208d7d450089
-
SHA512
0dcbf78abdd89a129bf2e7842679c03df62f951658e4aaab3045518209887eb326a142e4e87b2c8f5b43b0685d1fde49dba346634abb1a1133d659fa83b362f6
-
SSDEEP
196608:OIJ6eA5cPmiRqfk0ScX/eBDv+cRc7A4Yn7WILy+aEkcGXe6bqmOIhJZEFIxgabSR:Of1xAcX/Or/M07neRJXe6basrSsgabI
-
Detect Blackmoon payload
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-