Behavioral task
behavioral1
Sample
e607cdb3be5f0304d51153a63a471e65323bbebdef22c30060334206a14ffca1.exe
Resource
win7-20240903-en
General
-
Target
dc4b821110e20925d3e073084db61e78d860d1ed0f4fe03bb34bcf2fb32666e6
-
Size
3.7MB
-
MD5
dfa4e50db1f4dde8ff0463c0aa291f00
-
SHA1
6502662c649052468310b015dfcba48d0cc1a31b
-
SHA256
dc4b821110e20925d3e073084db61e78d860d1ed0f4fe03bb34bcf2fb32666e6
-
SHA512
71f97ee67dd23992f170dde77794a7f498c6dd40756ee1661bb077c0c4b599634e49962062462f795e4c1b0a93d1ee51e17f7b4da4199c44033460b41008a903
-
SSDEEP
98304:/mg/z2N3bs6d93eLmRLXcv1wh3DprkVIl11Ruu:eg/gbJjXC1wVysbRuu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule static1/unpack002/out.upx family_blackmoon -
resource yara_rule static1/unpack001/e607cdb3be5f0304d51153a63a471e65323bbebdef22c30060334206a14ffca1 upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/out.upx
Files
-
dc4b821110e20925d3e073084db61e78d860d1ed0f4fe03bb34bcf2fb32666e6.zip
Password: infected
-
e607cdb3be5f0304d51153a63a471e65323bbebdef22c30060334206a14ffca1.exe windows:4 windows x86 arch:x86
Code Sign
78:db:aa:f7:63:db:ff:b4:43:df:ea:8f:b2:f8:57:8fCertificate
IssuerCN=Root AgencyNot Before10/01/2018, 12:36Not After31/12/2039, 23:59SubjectCN=Qihoo 360 Software (Beijing) Company Limited,O=Qihoo 360 Software (Beijing) Company Limited,1.2.840.113549.1.9.1=#130025:1f:5d:98:81:82:17:2e:3c:41:9e:01:4f:b0:40:4cCertificate
IssuerCN=Certification Authority of WoSign,O=WoSign CA Limited,C=CNNot Before08/08/2009, 01:00Not After08/08/2024, 01:00SubjectCN=WoSign Time Stamping Signer,O=WoSign CA Limited,C=CNExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
12:ad:4c:bb:74:86:50:40:47:47:32:b2:16:17:80:a5:9f:16:94:83Signer
Actual PE Digest12:ad:4c:bb:74:86:50:40:47:47:32:b2:16:17:80:a5:9f:16:94:83Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE