Behavioral task
behavioral1
Sample
7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8.exe
Resource
win10v2004-20241007-en
General
-
Target
7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8
-
Size
112KB
-
MD5
2f19153de410b96712339329636cf4fc
-
SHA1
b946c31da2db9cc7b89aa78f1f98e054aba52517
-
SHA256
7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8
-
SHA512
f64a9cd49fbafdf917be01b688e70e5f08073a9fc2e04ea348f601f47b0af5065c6b317f2cc726ea5ea3b9687523dd38f8d6858193ce804908e8a224a554bbc4
-
SSDEEP
1536:QH26lUbnZEoOAgiEQsTbVoZW+qyYuordqeM8u3t2Dz445IcIp:22CxAszVokBPVM8u3tyScIp
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8
Files
-
7d8c067c707c929d6f9b12d7756d7566b53e38bfc5ccef90c752896ae35102e8.exe windows:4 windows x86 arch:x86
61052f2cbc60b6a9563e7da8d0241874
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
RtlMoveMemory
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
ReadFile
lstrcpyn
CreateFileA
WritePrivateProfileStringA
DeleteFileA
FindNextFileA
FindFirstFileA
FindClose
CreateDirectoryA
GetCommandLineA
Process32Next
CloseHandle
TerminateProcess
OpenProcess
Process32First
GetFileSize
CreateToolhelp32Snapshot
GetVersionExA
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
GetVersion
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
PeekMessageA
shlwapi
PathFileExistsA
PathIsDirectoryA
shell32
ShellExecuteA
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ