General
-
Target
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
-
Size
8.9MB
-
Sample
240908-s9blhavajl
-
MD5
44159a48df832e9a12636f37044b29ea
-
SHA1
a5c43861ad91a35e71cb0ab748384b092fe4f841
-
SHA256
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
-
SHA512
4896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56
-
SSDEEP
196608:8HygLd6jkPHSwzSnuUxxpiS0My1WeeNSvJgePF4yM/CdVcVhF5:NWUerWZt0Myph20+
Static task
static1
Behavioral task
behavioral1
Sample
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
-
Size
8.9MB
-
MD5
44159a48df832e9a12636f37044b29ea
-
SHA1
a5c43861ad91a35e71cb0ab748384b092fe4f841
-
SHA256
4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22
-
SHA512
4896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56
-
SSDEEP
196608:8HygLd6jkPHSwzSnuUxxpiS0My1WeeNSvJgePF4yM/CdVcVhF5:NWUerWZt0Myph20+
-
Detect Blackmoon payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-