C:\Users\pipi-\source\repos\encryptor\Release\encryptor.pdb
Behavioral task
behavioral1
Sample
a855fa52c07ea362123e8cd9fd293824a46fac160c88819aae2cb4212b63bec4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a855fa52c07ea362123e8cd9fd293824a46fac160c88819aae2cb4212b63bec4.exe
Resource
win10v2004-20241007-en
General
-
Target
18001626286.zip
-
Size
1.2MB
-
MD5
01615f45f03e2f0330bcf2de26755058
-
SHA1
ecbe4d80589f94e7619897d869abb6b8de7f4cbb
-
SHA256
da6585e8b34d370c9ed80329f6691a0ea3379ecdb267f64574f03232623dd2f8
-
SHA512
9d414330905da245692d4de912dabde0490611726e6c4604cb3feefedf4d078de6c0ba96d3ace3d860bf9bdc3c31dc47f89c728534692f768946690ad3545adf
-
SSDEEP
24576:jhT5MEv5K2Q/UAXRljjKrrq8gLt4mKQMpc/Lv3YzqIJ5gJoNaFH:R5pvk2qU6lje+8UubQMp3mG5gJp
Malware Config
Signatures
-
Blacksuit_windows family
-
Detects the Windows variant of BlackSuit Ransomware 1 IoCs
resource yara_rule static1/unpack001/a855fa52c07ea362123e8cd9fd293824a46fac160c88819aae2cb4212b63bec4 family_blacksuit_windows -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a855fa52c07ea362123e8cd9fd293824a46fac160c88819aae2cb4212b63bec4
Files
-
18001626286.zip.zip
Password: infected
-
a855fa52c07ea362123e8cd9fd293824a46fac160c88819aae2cb4212b63bec4.exe windows:6 windows x86 arch:x86
11fc1edb442e257617e8672be635a02f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
HeapReAlloc
CloseHandle
RaiseException
CreateThread
HeapAlloc
DecodePointer
GetProcAddress
SetFilePointerEx
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
lstrcmpiW
CreateIoCompletionPort
MoveFileW
GetDriveTypeW
FlushFileBuffers
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
Sleep
VirtualFree
MultiByteToWideChar
GetStdHandle
GetFileType
GetEnvironmentVariableW
GetACP
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
FindClose
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetLogicalDriveStringsW
HeapSize
OpenProcess
CreateFileW
InitializeCriticalSectionEx
CreateMutexW
SetEndOfFile
GetQueuedCompletionStatus
InitializeConditionVariable
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
WakeAllConditionVariable
TerminateProcess
WriteFile
GetCurrentProcess
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindNextFileW
GetCommandLineW
EnterCriticalSection
HeapFree
GetFileSizeEx
FindFirstFileW
CancelIo
ReadFile
GetLocaleInfoW
LCMapStringW
CompareStringW
SleepConditionVariableCS
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetConsoleOutputCP
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
IsDebuggerPresent
GetNativeSystemInfo
GetStringTypeW
EncodePointer
LCMapStringEx
GetCPInfo
WriteConsoleW
user32
GetProcessWindowStation
wsprintfW
MessageBoxW
GetUserObjectInformationW
advapi32
CryptDestroyHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptEnumProvidersW
CryptSignHashW
DeregisterEventSource
CryptCreateHash
CryptDecrypt
shell32
CommandLineToArgvW
ShellExecuteW
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmStartSession
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
netapi32
NetShareEnum
NetApiBufferFree
iphlpapi
GetIpAddrTable
ws2_32
select
ntohs
getsockopt
ioctlsocket
bind
WSACleanup
closesocket
ntohl
WSASocketW
WSAStartup
socket
WSAAddressToStringW
htonl
htons
WSAGetLastError
inet_addr
inet_ntoa
gethostbyaddr
getservbyport
getservbyname
WSASetLastError
recv
send
connect
gethostbyname
setsockopt
shutdown
WSAIoctl
bcrypt
BCryptGenRandom
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 524KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
8�� �u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE