�ӳ���1
Behavioral task
behavioral1
Sample
f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c.dll
Resource
win10v2004-20240426-en
General
-
Target
f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c
-
Size
108KB
-
MD5
3cf7265ca045e107412e11028f4dd14d
-
SHA1
2d748c6b4c555af7ae562b0c6daca8bfd7a8f413
-
SHA256
f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c
-
SHA512
d6a2ed6a3f30654d08fc9f101e5e4371a46d315f62309b777d71fdb48d4b35e0d52d35d48a6282437ae62ef7b3fbaa2f8f1ac9393e041682937a467833e66f59
-
SSDEEP
1536:k3EWVfZiMC1Glv9XZEl7Zy/dLUi7f/UTlDLxL88uEfEIviIR:k3DVfnm7IbUTxlVfhr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c
Files
-
f69710279dcdc0c05bb2561100a1e5336ecbcd3edad48ddbdb04d57021f5939c.dll windows:4 windows x86 arch:x86
1447b1cf006bd0bb617c3d557d76dabc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
lstrcpyn
RtlMoveMemory
GetLogicalDriveStringsA
QueryDosDeviceA
VirtualProtect
AddVectoredExceptionHandler
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetCurrentProcess
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
VirtualFree
OpenProcess
VirtualQueryEx
VirtualProtectEx
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
ReadFile
GetFileSize
CreateFileA
GetCommandLineA
GetModuleFileNameA
LCMapStringA
GetProcAddress
ReadProcessMemory
LoadLibraryA
user32
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
PeekMessageA
psapi
GetProcessImageFileNameA
msvcrt
calloc
atoi
_ftol
free
malloc
sprintf
strtod
strncpy
??3@YAXPAX@Z
strncmp
??2@YAPAXI@Z
strrchr
strchr
realloc
modf
memmove
__CxxFrameHandler
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ