_�����ӳ���
Behavioral task
behavioral1
Sample
bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc.dll
Resource
win10v2004-20240611-en
General
-
Target
bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc
-
Size
1.4MB
-
MD5
67b0dd9eea8409429481bbc5b1361a56
-
SHA1
53afc057268a4bfe5eca7e629307620116c5bfef
-
SHA256
bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc
-
SHA512
ff5f32ebb083133eb6eb0eee7f607d6639fce5c314e7abee752e77dccdd297d178f7515884f0101787c33e7f5b7de418734623473a4aee4289abbdcf2d3b6ccc
-
SSDEEP
24576:QIQGDNJ5JfDo2agkCmaCBve2j2HwyMp35juLD1P3f2FfWl8KuqGavkg3NyNIbbb1:Qvi3+s8KuqGaX0ToIBAUZLYf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc
Files
-
bd14e4312dea397112b075a8282bd30175a88d06f8483e80a90da99aad1d1ffc.dll windows:4 windows x86 arch:x86
46467220b5529a5f14a578414866b2c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
GetVersionExA
GetCurrentProcess
IsWow64Process
CopyFileA
VirtualAllocEx
WideCharToMultiByte
GetSystemDirectoryA
VirtualFreeEx
GetLogicalDriveStringsA
QueryDosDeviceA
GetCommandLineA
GetModuleHandleA
Sleep
CloseHandle
OpenProcess
lstrcpynA
IsBadStringPtrA
IsBadCodePtr
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentProcessId
GetEnvironmentVariableA
SetEnvironmentVariableA
RtlMoveMemory
GlobalAlloc
ReadProcessMemory
ExitProcess
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
lstrlenW
LocalAlloc
LocalFree
WriteProcessMemory
CreateWaitableTimerA
SetWaitableTimer
InitializeCriticalSection
FindFirstFileA
FindClose
CreateFileA
lstrcpyn
EnterCriticalSection
LeaveCriticalSection
IsBadWritePtr
RtlZeroMemory
VirtualQuery
LoadLibraryA
Module32First
Module32Next
lstrcmpiA
IsBadReadPtr
GetCurrentThreadId
GlobalFree
GetCurrentThread
ExitThread
OpenThread
GetThreadTimes
LoadLibraryExA
FreeLibrary
FlushInstructionCache
VirtualProtect
HeapReAlloc
GetTickCount
GetTempPathA
ReadFile
GetFileSize
DeleteFileA
GetModuleFileNameA
GetUserDefaultLCID
GetLocalTime
WriteFile
SetFilePointer
LCMapStringA
InterlockedExchange
FlushFileBuffers
SetStdHandle
SetUnhandledExceptionFilter
GetStringTypeW
HeapSize
GetStringTypeA
GetOEMCP
GetCPInfo
VirtualFree
CreateToolhelp32Snapshot
VirtualAlloc
LCMapStringW
RaiseException
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
SetLastError
TlsFree
TerminateProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
GetVersion
GetACP
DeleteCriticalSection
CreateThread
user32
GetWindow
GetClassNameA
wsprintfA
GetWindowTextA
IsWindow
wvsprintfA
MessageBoxA
EnumWindows
GetAncestor
IsWindowVisible
MsgWaitForMultipleObjects
GetWindowThreadProcessId
GetDesktopWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
SetWindowLongA
shlwapi
PathIsDirectoryA
PathFileExistsA
dbghelp
MakeSureDirectoryPathExists
ole32
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
CLSIDFromProgID
oleaut32
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
SafeArrayDestroy
VariantClear
SysAllocString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
Exports
Exports
Sections
.text Size: 544KB - Virtual size: 543KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 808KB - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ