SHEN
Behavioral task
behavioral1
Sample
1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12.dll
Resource
win10v2004-20240802-en
General
-
Target
1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12
-
Size
1.6MB
-
MD5
36dfc6b4dd71fe38fd229879ea6bbd27
-
SHA1
7443a86e5f0b601f7030f06b3a72733cb4f10485
-
SHA256
1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12
-
SHA512
a359e56697311a94dbdc50823b3befebad6ff257393272e6530cb0655cf354200502aae21582b0748fa23b67f545b6c20f2835c9681c870743298008a326d071
-
SSDEEP
24576:LerC9Kf2Cad8RQ7sEiSo0bVSK0rrzRfTFuKiUR5Z3F:LJxyrSo0TGzNZj3F
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12
Files
-
1b2862282b51b0f38beb160f6c96d8172afb53d0114f15c1621cda60c3490c12.dll windows:4 windows x86 arch:x86
4c0be60976af8bd1087d7f47b9d79238
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetCommandLineA
LCMapStringA
SetFileAttributesA
WriteFile
FindClose
FindFirstFileA
FindNextFileA
CreateFileA
GetFileSize
ReadFile
GetTickCount
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CreateThread
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
CloseHandle
OpenProcess
GetCurrentProcess
Sleep
VirtualProtect
GetLocalTime
GetCurrentProcessId
lstrcpyn
LocalFree
LocalAlloc
GlobalMemoryStatusEx
GetProcAddress
VirtualFree
LoadLibraryA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
SetFilePointer
LCMapStringW
GetCPInfo
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
GetWindowsDirectoryA
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
VirtualAlloc
gdi32
GetDeviceCaps
TranslateCharsetInfo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
StretchBlt
GetObjectA
GetDIBits
DeleteDC
DeleteObject
CreateFontA
advapi32
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CryptDestroyHash
CryptGetHashParam
CryptHashData
user32
GetWindowLongA
IsWindowVisible
GetWindowTextA
MoveWindow
IsWindow
GetWindowThreadProcessId
SetLayeredWindowAttributes
SetWindowLongA
UnregisterHotKey
SetCapture
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
wsprintfA
MessageBoxA
GetForegroundWindow
SendInput
GetCursorPos
GetAsyncKeyState
GetClassNameA
SendMessageA
ScreenToClient
ReleaseCapture
CallWindowProcA
CreateWindowExA
GetSysColor
LoadBitmapA
RegisterHotKey
GetWindowInfo
wininet
HttpQueryInfoA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
psapi
GetProcessImageFileNameW
ws2_32
select
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
socket
WSAAsyncSelect
ntohs
getsockname
recv
send
connect
htons
inet_addr
closesocket
shlwapi
PathFileExistsA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_Destroy
ImageList_BeginDrag
ImageList_Add
ImageList_Create
Exports
Exports
Sections
.text Size: 784KB - Virtual size: 783KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 752KB - Virtual size: 856KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ