FDWFdw
Behavioral task
behavioral1
Sample
f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd.dll
Resource
win10v2004-20240426-en
General
-
Target
f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd
-
Size
624KB
-
MD5
61f4ed3301edb65e549a7a39836c2171
-
SHA1
16aa2611b2641395d15685f5057c8ec41992b84c
-
SHA256
f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd
-
SHA512
31a8599d36db8034a48c37dcbae663fc591451cd86d34444c59a338718b37584af7d87336cd1f7094ef4b7d72dd149dc19598954d49dc3d8c660159e11e60f86
-
SSDEEP
12288:q6f2hpYBZsu+36ifLZ4P9WLM7+6eomoyr8BMBCPY2S1:q6f2sHsu+Kif94lWLM7veo3yr0MB2a
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd
Files
-
f595637f96c39c485ce589b38426955ae91f6625535068c7ba3d047acb8dc3cd.dll windows:4 windows x86 arch:x86
a9ae55fbfcb9590b9245bc7ddb7a05bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetUnhandledExceptionFilter
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
Module32First
GetEnvironmentStringsW
LCMapStringW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CloseHandle
GetCurrentProcessId
GetTickCount
lstrlenW
WideCharToMultiByte
Process32First
Process32Next
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
WriteFile
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
WriteProcessMemory
ReadProcessMemory
VirtualProtectEx
VirtualQueryEx
GetCurrentThreadId
VirtualAllocEx
OpenProcess
CreateThread
CreateEventA
OpenEventA
CreateMutexA
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
VirtualFree
VirtualAlloc
GetEnvironmentStrings
CreateFileA
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetEnvironmentVariableA
CreateToolhelp32Snapshot
DeleteCriticalSection
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCurrentProcess
FlushFileBuffers
GetCPInfo
GetOEMCP
user32
IsWindowVisible
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
GetParent
GetWindowTextLengthW
GetWindowTextW
DestroyMenu
EnumWindows
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
FindWindowExA
LoadStringA
GetClientRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
SetForegroundWindow
SetActiveWindow
AttachThreadInput
SetWindowTextA
CreateWindowStationA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
UnregisterClassA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
winmm
PlaySoundA
shell32
ShellExecuteA
ws2_32
bind
listen
accept
recv
send
connect
WSAStartup
closesocket
getsockname
ntohs
WSAAsyncSelect
select
WSACleanup
socket
htons
inet_addr
gethostbyname
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
Exports
Exports
Sections
.text Size: 304KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ