General
-
Target
样本.zip
-
Size
180.3MB
-
Sample
240624-j5zm4asera
-
MD5
c37be047c0949b4f349ef99528f0d684
-
SHA1
8c40dd0b8585a2390271ecb7bb5513f779a0f123
-
SHA256
3a15890bedd42d2f1212ace0369dce19f30f85ac65faf3f094933b3be7a6372b
-
SHA512
935189eb061ae8b7d585df0873a0bcc6ffff84a0a49377c6c4313886345be57123ca930f783514d33cc09ae117003fe10d14845ac8c08fbe3a09794777ae9434
-
SSDEEP
3145728:hf1T1l+QtfwiI/ioad7Gq2DEq040HfnRAXHLfHBdSsDhHAnITNp:vhPI6oadN2wql0/nRwhDPTP
Behavioral task
behavioral1
Sample
??/8???Ukey????? (1).msi
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
??/8???Ukey????? (1).msi
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
9jRa0z93.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
9jRa0z93.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
??/output_64.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
??/output_64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
??/output_86.bin
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
??/output_86.bin
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
??/8???Ukey????? (1).msi
-
Size
1.9MB
-
MD5
269e05f516852a7baa5d168905b53917
-
SHA1
986a2a3649944755e675707a230b20c21c6ba2f0
-
SHA256
20d9e6fe87c8c9660e3bcb8b9413b8fd2464f242d2808b326a86bfc8289525b0
-
SHA512
4a6093525dc6274ccf9a5a06adc04507dcbfa172cf533fa68033c2a96c9683d2dc333fe21da14d74b47160d44635252f6e368cd3e6c5181401edaca36faed2cf
-
SSDEEP
49152:EJmYm2OgKO5qcIZ4Yh8teZKumZrCA7512QzwcZDrFL:nYFOgj5qc4KGAt12Qzw
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
9jRa0z93.exe
-
Size
25.5MB
-
MD5
c42a1742a8c1a69b5a9ec263f173daef
-
SHA1
11ffc34f7f0488ec7ffa6be74f3a8ece49bed3e6
-
SHA256
1c2d3ae570f73106e508a7c4892e11aec77d54012bd17dcf81d17ea6f100e34d
-
SHA512
8dc57f80b117f9125e5bf9a834801eb5b7e3ee6899f4eb719be3bcade533084efef803fbacc58e53c94efcbbee2901903d78c8d1e92891e4560bb4eb0e6c36c4
-
SSDEEP
786432:V6di1BEnvQu7vja8IDKrZMu4GwjSB6QJekq/b4S0tF:VsCu7v2jKrWuPwjq6gVftF
-
Detect Blackmoon payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
??/output_64.bin
-
Size
127KB
-
MD5
558d20b6f765fed74bde50a91fe61ef4
-
SHA1
241955c138dc478da65a95e94c494e4b0be0eeff
-
SHA256
46a1dd08480c28c79cda7858703e289d789d2b55c3ee804a1822e0ec4eae3221
-
SHA512
74dc8ddeeb03e08dcae7089cbd4eef765a0cf706f7e215e5d706996819cfebb8fcaab862b870fc03381b6fff54701a9329b6a8cd36eb37fa0d7447bebb3c08f5
-
SSDEEP
3072:xeaPmKcYQaVlrejcIT+E8EKhCfSLc1Ch4HDnIPUYk8DGKe:saPyYLHSjlTfKhCKo1Ck65le
Score1/10 -
-
-
Target
??/output_86.bin
-
Size
2KB
-
MD5
afd7b0a2c088191a757d7c2eda73628b
-
SHA1
21f55b70f07322f5c05dec1f1578db697187e3bc
-
SHA256
1686c1823ff14386392ace11a0d190b693e945224ab02219f76b16c523d47b13
-
SHA512
aee4a308938ed8c487b7ba24ac278aebcc0c628efbbad5f2c9724ab4c2c809bcbc95456b20999bdaaa6d0b1920aa2298f29b76d3d958f5939bf3b7f6ad411a2a
Score3/10 -