Behavioral task
behavioral1
Sample
98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1.exe
Resource
win10v2004-20240802-en
General
-
Target
98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1
-
Size
52KB
-
MD5
60d2a1741b614e8df71434e689eb482b
-
SHA1
2e7a53c5b26eb58f439f30feff5d882a3a19a4bc
-
SHA256
98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1
-
SHA512
453a6548ae2238bbd6871c3d3906e1678c363d4884a3eb55a6082366dd52bd938edb061741ae9cd474d36de335a711d4a724a9ffa550e3f31f8cae266de634f9
-
SSDEEP
768:C5JvrJYvbAZ+TQTCdmTG55HDLsqmU01Fw8ts5F/GxPi:C55r/ZvGmxxJFw8UFx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1
Files
-
98823ba72b4276456ee267bd03047faec07514b00e605b2993f879d74eb76cd1.exe windows:4 windows x86 arch:x86
e146922a11411e0bf7abeabae1a0441d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
LCMapStringA
ReadFile
GetModuleFileNameA
CreateFileA
LeaveCriticalSection
EnterCriticalSection
MoveFileA
WriteFile
CloseHandle
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
GetEnvironmentVariableA
DeleteCriticalSection
GetFileSize
InitializeCriticalSection
user32
wvsprintfA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
IsWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
wsprintfA
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
ws2_32
WSAStartup
socket
htons
inet_addr
connect
closesocket
send
recv
WSACleanup
msvcrt
??2@YAPAXI@Z
sprintf
__CxxFrameHandler
free
malloc
atoi
_ftol
modf
realloc
memmove
strncmp
??3@YAXPAX@Z
strrchr
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ