Behavioral task
behavioral1
Sample
1688-11-0x0000000000400000-0x0000000001374000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
1688-11-0x0000000000400000-0x0000000001374000-memory.dmp
-
Size
15.5MB
-
MD5
1377f08503b77b2dd75aa7dd48aa736c
-
SHA1
8fd4ef935f1f5471f2b2ca625d00a87ddeefa337
-
SHA256
d9fce91a973a171ef55112dbb5e6d3562f79a55c0dbd0e574ae0e3243ec60848
-
SHA512
6a6d86b7669b60105ddb40f17cb88338d7424fc05b1ba6ef912ba83c6fcfd3de2fb6f804936a32038f991598241c67c79922188d936003821f56d2a3ae14f2a9
-
SSDEEP
98304:PmiZ4Xy5nCLNhnZb/hrFy5nCLNhnZb/h1cwcxy5nCLNhnZb/hDy5nCLNhnZb/hDF:Pmiy1JpHJHx8JLJLJLJI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1688-11-0x0000000000400000-0x0000000001374000-memory.dmp
Files
-
1688-11-0x0000000000400000-0x0000000001374000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 14.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE