Behavioral task
behavioral1
Sample
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.exe
Resource
win11-20240426-en
General
-
Target
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.zip
-
Size
55KB
-
MD5
e816eab637b66ad7f4e85876434a9cc5
-
SHA1
b649040a311cfff0fe8d021845fc6376ae6b5040
-
SHA256
0bdce4d960e8b9537fbdcb4a70838be86163f355ba9f4344fd4982536924f27e
-
SHA512
1dab157df998aa82628c1a92594c7c9bd4f6ec5da7dd20b927844626cf9ad69019625165b00a6db68de0a6096ae0e52b2d75fb113375819063b690f5172ab75b
-
SSDEEP
1536:rS36U/nQk+TgIDNgCN3og3LzcX0wUDcInxw:SPQ3Tgfg3LAkwQcInxw
Malware Config
Extracted
blackmatter
3.0
4e591a315c54e8800dae714320555fa5
- Username:
[email protected] - Password:
yhU6VJ$&
- Username:
[email protected] - Password:
RPo@ndf9
- Username:
[email protected] - Password:
DH5U87@rA0ELa2
https://fluentzip.org
http://fluentzip.org
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Signatures
-
Blackmatter family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.exe
Files
-
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.zip.zip
Password: infected
-
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58.exe.exe windows:5 windows x86 arch:x86
b5f7572a69026027aaf438fad3024477
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextColor
SetPixel
SelectObject
CreateSolidBrush
user32
LoadMenuW
GetWindowTextW
GetDlgItem
DefWindowProcW
CreateMenu
GetKeyNameTextW
LoadImageW
kernel32
GetLastError
LoadLibraryW
LoadLibraryExA
GetTickCount
GetProcAddress
GetDateFormatW
FreeLibrary
FormatMessageW
GetModuleHandleA
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ