Behavioral task
behavioral1
Sample
82bfe4ebbf2bb6afe01d2daa0244739923dc70afa8d6a51ebbb45643be89b2c0.exe
Resource
win7-20240221-en
General
-
Target
82bfe4ebbf2bb6afe01d2daa0244739923dc70afa8d6a51ebbb45643be89b2c0
-
Size
3.1MB
-
MD5
93a8bfb563fd517b3d32225bf1d10368
-
SHA1
6ebf7d6283784de2e49232726597641f0e20979d
-
SHA256
82bfe4ebbf2bb6afe01d2daa0244739923dc70afa8d6a51ebbb45643be89b2c0
-
SHA512
21f0f9959ef5f5dd734828182ef517c3fea19a458de833088370776db6c55158c57b723f3487a6e8c5ed49ef47998da8f63eb3a1849356ea506efa19fade14e7
-
SSDEEP
49152:BKl2cAjzpwo50mhDk+LuDKsbohjSpstvEJaPEpfHX+MIgkw+NntqydRxi6:42fjzpwo50m5k+LaoZCOsA0qVdLi6
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82bfe4ebbf2bb6afe01d2daa0244739923dc70afa8d6a51ebbb45643be89b2c0
Files
-
82bfe4ebbf2bb6afe01d2daa0244739923dc70afa8d6a51ebbb45643be89b2c0.exe windows:4 windows x86 arch:x86
c4933ed2403bcf3378d0d6eccc88382f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
DrawDibDraw
avifil32
AVIStreamGetFrame
winmm
midiStreamClose
ws2_32
accept
kernel32
DuplicateHandle
user32
GetSysColorBrush
gdi32
PatBlt
winspool.drv
OpenPrinterA
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
shell32
DragQueryFileA
ole32
RevokeDragDrop
oleaut32
UnRegisterTypeLi
comctl32
ImageList_DragMove
wldap32
ord29
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1016KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ