Behavioral task
behavioral1
Sample
a589990d6a6ef22083a2c2a4f45da4a2e8d8bba81bfb09daadeaadbdecf85795.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a589990d6a6ef22083a2c2a4f45da4a2e8d8bba81bfb09daadeaadbdecf85795.dll
Resource
win10v2004-20240802-en
General
-
Target
a589990d6a6ef22083a2c2a4f45da4a2e8d8bba81bfb09daadeaadbdecf85795
-
Size
2.4MB
-
MD5
01faeb9a9ad5d97937f45b8bb36eec6e
-
SHA1
9a68127501d2d0b428cb3c0b38e4b054d806c530
-
SHA256
a589990d6a6ef22083a2c2a4f45da4a2e8d8bba81bfb09daadeaadbdecf85795
-
SHA512
b10bb0d8a5dfbe7147da926d7ccb19936b6f3dd0a4ae778a948d119e958d73254b91f5bab8451bd2ef8e71ab681063c5d96d39354c05ca67042f10c085492f0d
-
SSDEEP
49152:/hVtbTfL8OOUAjtr9Lk1MUs5aq8JjCCkBCpHZcLYKUSr1oBH3ZKD:ZVdcOGx9LkadIuCkBCp5hK5rqBXZKD
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
a589990d6a6ef22083a2c2a4f45da4a2e8d8bba81bfb09daadeaadbdecf85795.dll windows:4 windows x86 arch:x86
0d5b6251e0b8fca01d7d6c629c55d878
Code Sign
0d:ef:ee:9e:33:c9:5b:52:b0:e4:4d:86:ac:71:e4:71Certificate
IssuerCN=Tencent Technology(Shenzhen) Company Limited,C=ChinaNot Before08/11/2021, 06:59Not After30/12/2022, 16:00SubjectCN=Tencent Technology(Shenzhen) Company Limited,C=China16:39:39:99:45:77:78:6d:b5:ed:f3:7c:04:c5:86:10Certificate
IssuerCN=Microsoft Windows Hardware Compatibility Publisher,C=ChinaNot Before08/11/2021, 06:58Not After30/12/2022, 16:00SubjectCN=Microsoft Windows Hardware Compatibility Publisher,C=China16:ef:2d:9f:10:84:be:54:5b:1a:4b:99:69:ee:c9:ff:44:0d:fc:cb:e9:47:6c:8b:6e:89:54:92:4e:d1:7d:18Signer
Actual PE Digest16:ef:2d:9f:10:84:be:54:5b:1a:4b:99:69:ee:c9:ff:44:0d:fc:cb:e9:47:6c:8b:6e:89:54:92:4e:d1:7d:18Digest Algorithmsha256PE Digest Matchestrueb5:f9:b4:62:b6:70:d2:a6:6f:95:c3:1a:64:46:31:fd:35:18:66:75Signer
Actual PE Digestb5:f9:b4:62:b6:70:d2:a6:6f:95:c3:1a:64:46:31:fd:35:18:66:75Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualFree
GetCurrentProcessId
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateWaitableTimerA
SetWaitableTimer
CreateMutexA
OpenEventA
CreateEventA
MoveFileExA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
WriteFile
DeleteFileA
SetFileAttributesA
GetTickCount
GetModuleFileNameA
ReadFile
GetFileSize
Sleep
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceExA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GlobalMemoryStatusEx
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateFileA
lstrcpyn
GetTempPathA
WideCharToMultiByte
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
MultiByteToWideChar
SetFilePointer
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
lstrlenW
LCMapStringA
DeviceIoControl
GetFileType
GetStdHandle
SetHandleCount
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
user32
GetWindowThreadProcessId
GetWindowTextLengthW
GetWindowTextW
GetClassNameA
mouse_event
IsWindowVisible
GetWindowTextA
CreateWindowStationA
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
EnumWindows
PeekMessageA
advapi32
DeleteService
OpenServiceA
StartServiceA
CreateServiceA
OpenSCManagerA
ControlService
CloseServiceHandle
shell32
ShellExecuteA
ws2_32
closesocket
socket
htons
connect
gethostbyname
send
recv
getsockname
ntohs
WSAAsyncSelect
select
WSACleanup
WSAStartup
inet_addr
shlwapi
PathFileExistsA
PathFindFileNameA
Exports
Exports
��װ����
��������
��������
�����ļ�
���ֽڼ�
�رձ���
�ر�����
������ַ
������Ȩ
ģ����ַ
ǿɱ����
ǿɾ�ļ�
�����ڴ�
�ͷ��ڴ�
���������ƶ�
����λ���ƶ�
���������ƶ�
д�ֽڼ�
�����
ѡ��ģʽ
���ؽ���
���ؽ���Wn7
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
WQKSLA0 Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ