________________________
Behavioral task
behavioral1
Sample
f4d69acc82de86db59ff733d7c4504240b8bc8988e3d8593ce674415f0db74b7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4d69acc82de86db59ff733d7c4504240b8bc8988e3d8593ce674415f0db74b7.dll
Resource
win10v2004-20240704-en
General
-
Target
8893047b15405b20a39afbb8f9cc4d1e.bin
-
Size
45KB
-
MD5
532c395a85d2c80b6133f5efd557b4d9
-
SHA1
3405c2da3f5855a0600319ef39a765cdf77de599
-
SHA256
f9113b6cf705d399ab6f394d7df4b26301909f48f2230b93cc7c9a0dae0600e2
-
SHA512
703080a1197628ce86e4d5aa97ff17408a35c36a7d85f19a7f12f8fbd0d6e092ac7770316f796c9bc3ba1c72cd1ac957494a5a2f02e234173c6c0089ecb46b34
-
SSDEEP
768:mF16baO0azVTUEu1ltKAaLMJDlKr5ukNObg0R473IqpWBxqRDm5/Yoki87B:mEaSTzudXbWuk+gJ7YqgBIR65/kf7B
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule static1/unpack001/f4d69acc82de86db59ff733d7c4504240b8bc8988e3d8593ce674415f0db74b7.dll family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f4d69acc82de86db59ff733d7c4504240b8bc8988e3d8593ce674415f0db74b7.dll
Files
-
8893047b15405b20a39afbb8f9cc4d1e.bin.zip
Password: infected
-
f4d69acc82de86db59ff733d7c4504240b8bc8988e3d8593ce674415f0db74b7.dll.dll windows:4 windows x86 arch:x86
Password: infected
5777c26250acbdcabdaf952b8e7bb328
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
GetTickCount
GetCommandLineA
GetModuleFileNameA
FreeLibrary
HeapReAlloc
LoadLibraryA
LCMapStringA
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
Sleep
TerminateProcess
OpenProcess
GetCurrentProcess
GetCurrentProcessId
CloseHandle
GetProcAddress
CreateThread
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
user32
TranslateMessage
GetMessageA
DispatchMessageA
wsprintfA
MessageBoxA
GetAsyncKeyState
PeekMessageA
GetSystemMetrics
gdi32
DeleteObject
SelectObject
DeleteDC
BitBlt
GetDIBits
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ