Behavioral task
behavioral1
Sample
0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623.exe
Resource
win10v2004-20240508-en
General
-
Target
0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623
-
Size
140KB
-
MD5
b65f102e164dc6af9f5e8d7d0f68a8e9
-
SHA1
f0b33e9df2ffc09a5a323021d616eb6469c96b19
-
SHA256
0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623
-
SHA512
cd994585a408c81a42bed40ad84650e0c0148dcbdb5a312608a0641e86da9190dc3066189ffec462d6f1ca860580dc0070d30dbb585b2bf0df44a873fe99c72a
-
SSDEEP
1536:/e17kpck/eF5RX/UgcD+R4DuDbigi5fTfFqCbpXTXNfBPKdILTahYRvqp262BI+l:Yi5fTfFqC1dfO1EZ6BfcHBcF0ytrut
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623
Files
-
0f23b387d2c79325c7092d091001c50854fb82e4311419d552a82de5cb672623.exe windows:4 windows x86 arch:x86
8399dc5aa2b32ab5d86246cf45b6af20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
DeleteFileA
GetModuleFileNameA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetTickCount
Sleep
GetCommandLineA
IsBadReadPtr
GetProcAddress
LoadLibraryA
HeapReAlloc
ExitProcess
GetModuleHandleA
lstrcatA
lstrcpyn
HeapFree
RtlMoveMemory
HeapAlloc
GetProcessHeap
GlobalFree
GlobalAlloc
MultiByteToWideChar
DeviceIoControl
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
FreeLibrary
CreateFileA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetVersion
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
user32
wsprintfA
MessageBoxA
GetInputState
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
advapi32
GetServiceKeyNameA
EnumDependentServicesA
EnumServicesStatusExA
EnumServicesStatusA
ChangeServiceConfigA
ControlService
StartServiceA
DeleteService
CreateServiceA
GetServiceDisplayNameA
ChangeServiceConfig2A
QueryServiceConfig2A
QueryServiceConfigA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
psapi
GetProcessImageFileNameW
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ