Behavioral task
behavioral1
Sample
18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe
Resource
win10v2004-20240611-en
General
-
Target
18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334
-
Size
526KB
-
MD5
3b7c973bca4c7034c009b9cd2b0140cd
-
SHA1
2c5de140bf2280e32fb5597d24146d73568121eb
-
SHA256
18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334
-
SHA512
441b2439e63b3a31f2e806f0e924977ae4119f8eb48de25367f61f74f5d03b8a0c8c2173899d6e12bbab0ace07720323eae9fb51ad469b5535f5d5d824cf2a98
-
SSDEEP
6144:lrhCmSiJnFtXJch8bZ0iDd+gFuC88bYVWTb4gU+b2HV70/2wPe1ep1B+wsiBzVXv:lYmSczXJWSMg188MMTWSrB+wbzVXZ7o
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334
Files
-
18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe windows:4 windows x86 arch:x86
27e7feaf2ee24bc861a7336843293557
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GlobalMemoryStatusEx
GetProcessHeap
HeapAlloc
GlobalSize
DeviceIoControl
VirtualAlloc
VirtualFree
GetCurrentProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32First
lstrlenA
CloseHandle
Process32Next
GetLogicalDriveStringsA
QueryDosDeviceA
VirtualAllocEx
VirtualFreeEx
CreateRemoteThread
GetExitCodeThread
GetEnvironmentVariableA
CreateProcessA
FindFirstFileA
FindNextFileA
FindClose
GetModuleHandleA
GetCurrentThreadId
ExitProcess
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
ReadFile
GetFileSize
WaitForSingleObject
GetStartupInfoA
WriteFile
DeleteFileA
RemoveDirectoryA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
TerminateProcess
CreateDirectoryA
CreateThread
CreateFileA
GetProcAddress
Sleep
user32
MessageBoxA
WaitForInputIdle
GetClassNameA
GetWindowTextA
wsprintfA
SendInput
TranslateMessage
SetForegroundWindow
SetActiveWindow
AttachThreadInput
IsWindowVisible
DispatchMessageA
GetMessageA
PeekMessageA
GetWindowThreadProcessId
SetWindowPos
FindWindowExA
MapVirtualKeyA
advapi32
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteEx
ws2_32
ntohs
select
socket
htons
getsockname
connect
gethostbyname
WSACleanup
recv
send
closesocket
WSAStartup
inet_addr
WSAAsyncSelect
psapi
GetProcessImageFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
wininet
InternetTimeToSystemTime
msvcrt
strstr
malloc
realloc
free
strrchr
modf
strchr
_CIfmod
strtod
_CIpow
floor
rand
srand
sprintf
_ftol
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
shlwapi
PathFileExistsA
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantInit
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantClear
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
RegisterTypeLi
LHashValOfNameSys
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xubrRH0 Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ