Behavioral task
behavioral1
Sample
3fe9fab2798220225da8d4caadf278a95cd43e0964f2e9a3562ff54e811937a7.exe
Resource
win7-20240704-en
General
-
Target
3fe9fab2798220225da8d4caadf278a95cd43e0964f2e9a3562ff54e811937a7
-
Size
15.7MB
-
MD5
651bbc5ec2718914d75b98840d175852
-
SHA1
2530ce07ed8aae2be1396cfe414023402d4623e7
-
SHA256
3fe9fab2798220225da8d4caadf278a95cd43e0964f2e9a3562ff54e811937a7
-
SHA512
6b6a597640eabccc2dead5681dcf6d83b6fe8c1beae47ae2555be661f3b22d34bed2b2071134ac65d97d6fed3bb6d16d33a2302c415634bb073a3e556e624303
-
SSDEEP
196608:yQn8aamp/JVsFeePD9mCOPx944AJvVN8bhCgmsrpW9kElNmjpGt37tR/H:W6/OPD9He4hGbprAvmjpGtLv/H
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fe9fab2798220225da8d4caadf278a95cd43e0964f2e9a3562ff54e811937a7
Files
-
3fe9fab2798220225da8d4caadf278a95cd43e0964f2e9a3562ff54e811937a7.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp3 Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp Size: 856KB - Virtual size: 856KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE