Init
Behavioral task
behavioral1
Sample
575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2.dll
Resource
win10v2004-20240802-en
General
-
Target
575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2
-
Size
204KB
-
MD5
8d0ef0e2ad66439a02258e0acbc2914c
-
SHA1
3158bead5f7fab02743c8442f4b4e7e56cddbac6
-
SHA256
575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2
-
SHA512
efcb5973511069165ff99d2be97561827f67bc06981c37cd129a2ad2f0b193bbdb1ca13f05967a692476e3f0a92dd257b809f6df2864eb103c76dfc93166edf9
-
SSDEEP
3072:XJYrXccvhY82E6JWOO/5gqZPtUSOoq2qUb9tGIHSLZ8KF:5YD5h32bJLO/esPta2NJA
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2
Files
-
575cbd46726a08cd8f64f9029713c2f2ebf9e6ee6ea38c238b337d873ff535a2.dll windows:4 windows x86 arch:x86
e94386a3168a8166bc5ba533192810b5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTempFileNameA
GetSystemDirectoryA
ReadProcessMemory
CreateRemoteThread
MultiByteToWideChar
GetCurrentThreadId
DebugActiveProcess
WaitForDebugEvent
ContinueDebugEvent
DebugActiveProcessStop
GetLogicalDriveStringsA
QueryDosDeviceA
GetCurrentProcessId
GetVersionExA
GetTempPathA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
GetTickCount
WideCharToMultiByte
GetDiskFreeSpaceA
GetCurrentDirectoryA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
FlushFileBuffers
SetStdHandle
LCMapStringW
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
InterlockedDecrement
GetOEMCP
CopyFileA
VirtualAllocEx
MulDiv
GetACP
GetCPInfo
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
user32
GetMessageA
DispatchMessageA
wsprintfA
MessageBoxA
TranslateMessage
PeekMessageA
PostMessageA
GetWindow
GetDesktopWindow
GetWindowTextA
GetWindowTextLengthA
GetClassNameA
IsWindowVisible
GetParent
GetWindowThreadProcessId
WaitForInputIdle
RegisterWindowMessageA
shlwapi
PathFindFileNameA
oleaut32
VariantTimeToSystemTime
Exports
Exports
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmps0 Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ