Behavioral task
behavioral1
Sample
bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac.exe
Resource
win10v2004-20240802-en
General
-
Target
bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac
-
Size
52KB
-
MD5
09b83ce3e81694cdd802b08dc0bedbf6
-
SHA1
0aa5e2c8e45522de958e4fb6457579803ffbd5b3
-
SHA256
bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac
-
SHA512
c8d6119dd5d9be1d32f46d75bbc891e40794e3fef4c157cbe0c975f17d969a5597846004de4f6e5dc3ddd400ec41aad0a68b5831ae9b6824724e8ed87d54189f
-
SSDEEP
768:C5JvrJYvbAZ+TQTCdmTG55HDLsqmU01Fw8ts5F/2xPi:C55r/ZvGmxxJFw8UFR
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac
Files
-
bd42beeefcadff4f1d725019007cb97575437ca382b4024b5fa2233bdef5e4ac.exe windows:4 windows x86 arch:x86
e146922a11411e0bf7abeabae1a0441d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
LCMapStringA
ReadFile
GetModuleFileNameA
CreateFileA
LeaveCriticalSection
EnterCriticalSection
MoveFileA
WriteFile
CloseHandle
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
GetEnvironmentVariableA
DeleteCriticalSection
GetFileSize
InitializeCriticalSection
user32
wvsprintfA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
IsWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
wsprintfA
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
ws2_32
WSAStartup
socket
htons
inet_addr
connect
closesocket
send
recv
WSACleanup
msvcrt
??2@YAPAXI@Z
sprintf
__CxxFrameHandler
free
malloc
atoi
_ftol
modf
realloc
memmove
strncmp
??3@YAXPAX@Z
strrchr
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ