IoAojOdjgK63945028HlgQYuCwUE
Behavioral task
behavioral1
Sample
9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee.dll
Resource
win11-20240802-en
General
-
Target
9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee
-
Size
100KB
-
MD5
832305e8e9ac8b0ad322af793467ad39
-
SHA1
63201c5dda80cd70676386fba87f34968e296de1
-
SHA256
9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee
-
SHA512
3ed725160c8137ed4388cf03afda4dc7b703fa74632dbf2d18e6a15a06e92da6320589b4902938f69e0f7a181a7a75ce5b1fc1708700d2cab876ee980fb23490
-
SSDEEP
1536:EYuo5JWhxuNeduj/zKCUTrTc2BtMQ+qXu/Las0Bpz0xMt+IqLEx:EgJFNegjBOe+Fz0xMt+Ilx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee
Files
-
9e6e3083405b8f4d6da3f9db1acd2c2a1d484f2268b638042b8fc3bc41168eee.dll windows:4 windows x86 arch:x86
66a927b99d2ed944e8f631d2b176d59f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
GetTickCount
GetPrivateProfileStringA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
HeapFree
LCMapStringA
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CloseHandle
TerminateProcess
OpenProcess
GetCurrentProcess
Sleep
LoadLibraryA
GetCurrentProcessId
FlushFileBuffers
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
InterlockedIncrement
SetFilePointer
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
user32
DispatchMessageA
wsprintfA
MessageBoxA
GetAsyncKeyState
TranslateMessage
GetMessageA
PeekMessageA
GetSystemMetrics
gdi32
DeleteObject
SelectObject
DeleteDC
BitBlt
GetDIBits
oleaut32
VariantTimeToSystemTime
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ