Behavioral task
behavioral1
Sample
199319e65f439450007bee24e20e0aac53c67bb6706b3de4b82d4e6874c59238.exe
Resource
win7-20240221-en
General
-
Target
199319e65f439450007bee24e20e0aac53c67bb6706b3de4b82d4e6874c59238
-
Size
7.0MB
-
MD5
0306117b79b15253b47f3dff5e133166
-
SHA1
9fba44a4af4c2ccb68e1aa0fc3a851bf98115438
-
SHA256
199319e65f439450007bee24e20e0aac53c67bb6706b3de4b82d4e6874c59238
-
SHA512
0d1609ff9a9b6c62ca96b9cf8fbb7c6cf0aa199e22b055ca2298b756a75eab766f8a5442c0a1af987215bbe3cd338165eb0df9e33a7e187b5d6d4b7ad9c4fc07
-
SSDEEP
98304:PQPHH6O6XTBJYa6mknGzZr+HIPFtmOZ9G1ExwFB5URUSKnaSOaroSCa:i6O6XTYbmknGzwHIPHd9/wFBubK+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Mimikatz family
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule sample mimikatz -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 199319e65f439450007bee24e20e0aac53c67bb6706b3de4b82d4e6874c59238 -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
199319e65f439450007bee24e20e0aac53c67bb6706b3de4b82d4e6874c59238.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 396KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE