Behavioral task
behavioral1
Sample
b9ca606658b39a99c38615c721f77ca56cd80b8836d353030ab8a61cadd4a8f8.exe
Resource
win7-20240419-en
General
-
Target
b9ca606658b39a99c38615c721f77ca56cd80b8836d353030ab8a61cadd4a8f8
-
Size
436KB
-
MD5
ac9daffa76a3b5e63e636ed8414b558d
-
SHA1
b708c0bcd1722c4d10dfeacb87d865ee45d94540
-
SHA256
b9ca606658b39a99c38615c721f77ca56cd80b8836d353030ab8a61cadd4a8f8
-
SHA512
9fd132a031ce744820877590f171e4334ccd3217965c86f5b8e7426c0db37297c5d4d60893743d6c5d59f97cce50fdf5381977e71e7023992a7f413adc2f2b4a
-
SSDEEP
6144:dGdR+Yk/N8duBmG6t+UnRsRCQ/OJZOg7F:doR+Y4NSG6oUnRsdOJZOg7F
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b9ca606658b39a99c38615c721f77ca56cd80b8836d353030ab8a61cadd4a8f8
Files
-
b9ca606658b39a99c38615c721f77ca56cd80b8836d353030ab8a61cadd4a8f8.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 391KB - Virtual size: 390KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE