Behavioral task
behavioral1
Sample
6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203dN.exe
Resource
win10v2004-20241007-en
General
-
Target
6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203dN.exe
-
Size
460KB
-
MD5
3692a491f36a41b7cac328a129d506a0
-
SHA1
3da6f766175ad86a80a818998e7266b387022a02
-
SHA256
6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203d
-
SHA512
3d7fdb32d897cb1b915bd2db69884de02532477622ecffaaf520c1374ea2b4cd75a80645177d78ad15fb1669ae88ee7903dfa29d592377eb68a53b62deb6535c
-
SSDEEP
12288:BK1CUpkqdxSjBnrXtFZEY3FxotLJpe1vj:BKHKqdxSjBDZEY3FxotVpe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203dN.exe
Files
-
6e062fccf068bf8c25453fd1960d03c1efe22d200afa2ce34b81b0505b40203dN.exe.exe windows:4 windows x86 arch:x86
50a5d0f8ad4bda2c17fec90726d8d642
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
listen
WSAStartup
socket
setsockopt
htons
accept
__WSAFDIsSet
select
recv
bind
closesocket
recvfrom
inet_addr
sendto
send
getpeername
connect
htonl
gethostname
getsockname
gethostbyname
WSACleanup
ntohs
inet_ntoa
kernel32
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
FreeLibrary
GetCommandLineA
ReadFile
GetFileSize
CreateFileA
WriteFile
CloseHandle
WritePrivateProfileStringA
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
CreateDirectoryA
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GlobalFree
RtlMoveMemory
RtlZeroMemory
GlobalAlloc
LoadLibraryA
Sleep
CreateThread
lstrcpyn
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
MultiByteToWideChar
SetWaitableTimer
CreateWaitableTimerA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetStringTypeA
GetStringTypeW
RtlUnwind
GetStartupInfoA
IsBadCodePtr
SetStdHandle
TlsFree
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
SystemTimeToFileTime
GetFileAttributesA
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalUnlock
GlobalHandle
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
GetClassLongA
SetPropA
GetPropA
DestroyWindow
CreateWindowExA
PeekMessageA
GetMessageA
wsprintfA
MessageBoxA
CharUpperA
DispatchMessageA
TranslateMessage
MsgWaitForMultipleObjects
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
UnregisterClassA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
shlwapi
PathFileExistsA
PathRemoveBlanksA
shell32
SHGetSpecialFolderPathA
wininet
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
comdlg32
GetFileTitleA
iphlpapi
GetIpAddrTable
SendARP
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
icmp
IcmpCreateFile
IcmpSendEcho
IcmpCloseHandle
Sections
.text Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE