Behavioral task
behavioral1
Sample
8a937a9e7155c41000b719fbe7fb814a756b5460278665fae0cee3d2858b4746.exe
Resource
win7-20241010-en
General
-
Target
8a937a9e7155c41000b719fbe7fb814a756b5460278665fae0cee3d2858b4746.exe
-
Size
428KB
-
MD5
57d9cd802b072b498a6ba575d0c3bcf7
-
SHA1
b84e7b8058c12740a2d17f07c791f9a14717ff17
-
SHA256
8a937a9e7155c41000b719fbe7fb814a756b5460278665fae0cee3d2858b4746
-
SHA512
91b1ea7f456077422527b7c7460f7b877f00ec7cfa1aac13d20197d82cebc57b370c000b03e3a9921e80387a8391106463b01c033888a480a753003efe4b6291
-
SSDEEP
6144:kvk3Q5ibjnNuuXckaL7pbRBkce97awj7L7orT/V:kvMQ5ibjnwka3pbRC19Gwj7orT/V
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8a937a9e7155c41000b719fbe7fb814a756b5460278665fae0cee3d2858b4746.exe
Files
-
8a937a9e7155c41000b719fbe7fb814a756b5460278665fae0cee3d2858b4746.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE