Behavioral task
behavioral1
Sample
3ca76a2c913ddf2a37c2c774b9616786d74cd7068946542edb2b2fa563abcab5.exe
Resource
win7-20240221-en
General
-
Target
3ca76a2c913ddf2a37c2c774b9616786d74cd7068946542edb2b2fa563abcab5.exe
-
Size
447KB
-
MD5
5396ddb76e600de73fc1164f39435211
-
SHA1
60f74d1ba3f4c27fe878925b0818286e8e862af9
-
SHA256
3ca76a2c913ddf2a37c2c774b9616786d74cd7068946542edb2b2fa563abcab5
-
SHA512
2273cc8833624581630ed5b9cfad3c81a2b216bc5e3e6599427ff1f5b151a0fa6b48270d292da9d7a45c585d6ae1f786133fc63bee436586b26d1a66ada8d85d
-
SSDEEP
6144:sZrK+r+l0eNPBJrOxQD90saoTXWIg7mljhubH:sZ++qlRBBOxQDU2XWIg6BiH
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ca76a2c913ddf2a37c2c774b9616786d74cd7068946542edb2b2fa563abcab5.exe
Files
-
3ca76a2c913ddf2a37c2c774b9616786d74cd7068946542edb2b2fa563abcab5.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE