_�����ӳ���
Behavioral task
behavioral1
Sample
3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49.dll
Resource
win10v2004-20240508-en
General
-
Target
3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49
-
Size
1.4MB
-
MD5
c497e35c7375f8aaa2a56317e9f1a154
-
SHA1
9814e83600cc84932dad3ddf41f0219fc3d50af4
-
SHA256
3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49
-
SHA512
22fd5ff9a06864079a732c6cfcf480daf6ef90f57e0832473c2a68b5ae254a6607e130f29e7fe4576c95ea4395db726a9dba464d86cea2a67aa81bb0f5f44268
-
SSDEEP
24576:Z1UbVJzrCi/pfSZo7DPvZpkDylfI+2ninfPqf2FfWl8KuqGavkg3NyNIbbbIoIBC:Zyz8yvfa+s8KuqGaX0ToIBAUZLY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49
Files
-
3bcbd85d4c1bb1b4ddd6bff1b1f01d333e9a6f60558ae2d84d6b946630ea0a49.dll windows:4 windows x86 arch:x86
26732a8d2029d154e78dc6d2a33321f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
GetCommandLineA
GetModuleHandleA
Sleep
CloseHandle
OpenProcess
lstrcpynA
ReadProcessMemory
ExitProcess
IsBadStringPtrA
IsBadCodePtr
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentProcessId
GetEnvironmentVariableA
SetEnvironmentVariableA
RtlMoveMemory
GlobalAlloc
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetSystemTimeAsFileTime
lstrcpyn
WriteProcessMemory
GlobalFree
CreateWaitableTimerA
SetWaitableTimer
InitializeCriticalSection
FindFirstFileA
FindClose
CreateFileA
EnterCriticalSection
LeaveCriticalSection
IsBadWritePtr
CopyFileA
VirtualAllocEx
GetSystemDirectoryA
VirtualFreeEx
RtlZeroMemory
VirtualQuery
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrcmpiA
IsBadReadPtr
GetCurrentThreadId
GetCurrentThread
ExitThread
LoadLibraryA
GetCurrentProcess
IsWow64Process
GetLogicalDriveStringsA
QueryDosDeviceA
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
OpenThread
GetThreadTimes
LoadLibraryExA
FreeLibrary
FlushInstructionCache
VirtualProtect
HeapReAlloc
GetModuleFileNameA
GetLocalTime
ReadFile
GetFileSize
WriteFile
GetUserDefaultLCID
GetTickCount
GetTempPathA
DeleteFileA
LCMapStringA
InterlockedExchange
FlushFileBuffers
SetStdHandle
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
HeapSize
GetOEMCP
GetCPInfo
VirtualFree
GetVersionExA
VirtualAlloc
LCMapStringW
SetFilePointer
RaiseException
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
SetLastError
TlsFree
TerminateProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
GetVersion
GetACP
DeleteCriticalSection
CreateThread
user32
GetWindowTextA
DispatchMessageA
GetWindowThreadProcessId
GetClassNameA
MessageBoxA
EnumWindows
GetAncestor
IsWindowVisible
GetWindow
IsWindow
MsgWaitForMultipleObjects
wvsprintfA
GetDesktopWindow
PeekMessageA
GetMessageA
TranslateMessage
wsprintfA
RegisterWindowMessageA
SetWindowLongA
shlwapi
PathIsDirectoryA
StrToIntExW
PathFileExistsA
StrToIntW
dbghelp
MakeSureDirectoryPathExists
ole32
OleRun
CoUninitialize
CoInitialize
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
oleaut32
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
SafeArrayDestroy
VariantClear
SysAllocString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
Exports
Exports
Sections
.text Size: 560KB - Virtual size: 558KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 808KB - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ