IZPDyj676789BjSFUr
Behavioral task
behavioral1
Sample
0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0.dll
Resource
win10v2004-20240802-en
General
-
Target
0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0.dll
-
Size
104KB
-
MD5
d4b705f2ca76f3326822e2b9d6c0e5cb
-
SHA1
cc825ff5c52d98dcf70f5c4c6245bca94dba2a4d
-
SHA256
0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0
-
SHA512
efea0403cbe24495acad99de8807f1a41d268861e2d4d7c7542ea33bff996ce7b8c7ccd3714e91d5366d8391b8e16b87ca24d56da04791f05a258103a235face
-
SSDEEP
1536:i1WPTFr0hYF5jXp8m6TIzX2INMq55u/b//xHU4HMt3i:sh8jVFnYhU4HMt3i
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0.dll
Files
-
0cbd44f95442fcb0ca16b933121dd6705d8263fed36e5eb02ae25bcc9c0bf5d0.dll.dll windows:4 windows x86 arch:x86
66a927b99d2ed944e8f631d2b176d59f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
GetTickCount
GetPrivateProfileStringA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
HeapFree
LCMapStringA
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CloseHandle
TerminateProcess
OpenProcess
GetCurrentProcess
Sleep
LoadLibraryA
GetCurrentProcessId
FlushFileBuffers
GetVersionExA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
InterlockedIncrement
SetFilePointer
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
user32
DispatchMessageA
wsprintfA
MessageBoxA
GetAsyncKeyState
TranslateMessage
GetMessageA
PeekMessageA
GetSystemMetrics
gdi32
DeleteObject
SelectObject
DeleteDC
BitBlt
GetDIBits
oleaut32
VariantTimeToSystemTime
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ