Behavioral task
behavioral1
Sample
58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23.exe
Resource
win10v2004-20241007-en
General
-
Target
58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23
-
Size
144KB
-
MD5
80eeb191abe38686038db7946e49774c
-
SHA1
49d136f1167ede48ebe38788030e40f8001f404a
-
SHA256
58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23
-
SHA512
9df0a4ca0bea6f0f1a7e9f134fc67e68d1a52b0b2822e8a7e06c449d33993df2ba06bfb091190b311a40fc84208e14fb042cf98df140d87ede7056db575e56c1
-
SSDEEP
3072:ZqJogYkcSNm9VoDPyhnBhMFE5fv0PfFYZZkT:Zq2kc4m9iDeBkEt0PfaH
Malware Config
Extracted
blackmatter
1.0
Signatures
-
Blackmatter family
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
Processes:
resource yara_rule sample family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23
Files
-
58260a6687486e39dc46461270b391280b7d59997d84b6639230d95e3bdfca23.exe windows:5 windows x86 arch:x86
Password: infected
914685b69f2ac2ff61b6b0f1883a054d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetPixel
GetPixel
SelectPalette
SelectObject
GetTextColor
BitBlt
GetDeviceCaps
CreateSolidBrush
CreateFontW
CreateDIBitmap
user32
LoadMenuW
LoadImageW
CreateDialogParamW
CreateWindowExW
DefWindowProcW
GetDlgItem
IsDlgButtonChecked
kernel32
GetLastError
GetProcAddress
GetModuleHandleA
GetLocaleInfoW
FreeLibrary
GetFileAttributesW
GetCommandLineW
GetCommandLineA
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyz Size: 512B - Virtual size: 141B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ