cAQQsnozjf1215206685TmvAbHuNbZ
Behavioral task
behavioral1
Sample
11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151.dll
Resource
win10v2004-20240802-en
General
-
Target
11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151.dll
-
Size
104KB
-
MD5
5574fe2122cbe31e6dbef1f0cf2888f8
-
SHA1
cae9033ca036192c7a44fdc70b6c888140f7867a
-
SHA256
11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151
-
SHA512
5624cb8d52bc989b31b0c281b03fbcdc0cebcc6f5cae8dcd6b36249428e661833fa264664515b73a27d06274d07ecf1f96ad915073de6eb2220c1f6e4d056249
-
SSDEEP
1536:JNYgj9qG3W5jXp8m6TIzX2INMq55u/b//xHU4HMtmN:YGWjVFnYhU4HMtmN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151.dll
Files
-
11c9ebce482e2db0639123e3750dd97a8803442accd9e51bb2bcc87d173b5151.dll.dll windows:4 windows x86 arch:x86
66a927b99d2ed944e8f631d2b176d59f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
GetTickCount
GetPrivateProfileStringA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
HeapFree
LCMapStringA
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CloseHandle
TerminateProcess
OpenProcess
GetCurrentProcess
Sleep
LoadLibraryA
GetCurrentProcessId
FlushFileBuffers
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
InterlockedIncrement
SetFilePointer
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
user32
DispatchMessageA
wsprintfA
MessageBoxA
GetAsyncKeyState
TranslateMessage
GetMessageA
PeekMessageA
GetSystemMetrics
gdi32
DeleteObject
SelectObject
DeleteDC
BitBlt
GetDIBits
oleaut32
VariantTimeToSystemTime
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ