________________________
Behavioral task
behavioral1
Sample
092bd9da04a0a473f832845aeb9041de8b0068d54731deed3a3af4201c5b0aa8.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
092bd9da04a0a473f832845aeb9041de8b0068d54731deed3a3af4201c5b0aa8.dll
Resource
win10v2004-20240704-en
General
-
Target
f17dea41df00276419391ebfdf4a2efe.bin
-
Size
45KB
-
MD5
38b9ea962d4c1ff8cfce9f0c19b4c737
-
SHA1
fd3f0c8d4911e600614947ae37babfdc8a393e7b
-
SHA256
2c186119e96da087606fa2706af5de9462a07546b70843b07600d65bd4ec2820
-
SHA512
db4779a21e9f3795530101bbff51670d9416c398014923057d43f0acb1ebf9ef4c749fbbe88a13b62d82218117a2aad0783566c779162651d54d11cb3df75e98
-
SSDEEP
768:z+TsigU+6Yo1RjtTkR/Ks1LDnVo1fMdR1cA0QUEI/rOiayH2zHmAAP7UeTQEienr:KTPf1DkxKHdsckUEI6iayWjfAP3qen2i
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule static1/unpack001/092bd9da04a0a473f832845aeb9041de8b0068d54731deed3a3af4201c5b0aa8.dll family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/092bd9da04a0a473f832845aeb9041de8b0068d54731deed3a3af4201c5b0aa8.dll
Files
-
f17dea41df00276419391ebfdf4a2efe.bin.zip
Password: infected
-
092bd9da04a0a473f832845aeb9041de8b0068d54731deed3a3af4201c5b0aa8.dll.dll windows:4 windows x86 arch:x86
Password: infected
5777c26250acbdcabdaf952b8e7bb328
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
GetTickCount
GetCommandLineA
GetModuleFileNameA
FreeLibrary
HeapReAlloc
LoadLibraryA
LCMapStringA
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
Sleep
TerminateProcess
OpenProcess
GetCurrentProcess
GetCurrentProcessId
CloseHandle
GetProcAddress
CreateThread
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
user32
TranslateMessage
GetMessageA
DispatchMessageA
wsprintfA
MessageBoxA
GetAsyncKeyState
PeekMessageA
GetSystemMetrics
gdi32
DeleteObject
SelectObject
DeleteDC
BitBlt
GetDIBits
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ