General
-
Target
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7
-
Size
15.2MB
-
Sample
250422-b8e4vszzgz
-
MD5
a7ee518f6c7457e15efe812526f99d44
-
SHA1
90e6e16fa0292a3ddd5813e4a2e0906a46e0b399
-
SHA256
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7
-
SHA512
bd5dfaec2701a0778ca731c64b9447c165b9d9a9eb40e8b8eea02b33926d57ffbde8a97c20c977a8c172c255c66fac654bdb8d2dda9ba2083a9df4479b2360fe
-
SSDEEP
98304:iy9afy9afy9afy9afy9afy9afy9afy9afy9a3WQtZ/K0tGOFWVRuLftCTfA38n0b:yWyZ/K0ttYVAATVpKmd0
Behavioral task
behavioral1
Sample
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7
-
Size
15.2MB
-
MD5
a7ee518f6c7457e15efe812526f99d44
-
SHA1
90e6e16fa0292a3ddd5813e4a2e0906a46e0b399
-
SHA256
990f084ff3520ce94c468c74077c3be48d285011c708b3315e28e077a875a5f7
-
SHA512
bd5dfaec2701a0778ca731c64b9447c165b9d9a9eb40e8b8eea02b33926d57ffbde8a97c20c977a8c172c255c66fac654bdb8d2dda9ba2083a9df4479b2360fe
-
SSDEEP
98304:iy9afy9afy9afy9afy9afy9afy9afy9afy9a3WQtZ/K0tGOFWVRuLftCTfA38n0b:yWyZ/K0ttYVAATVpKmd0
-
Blackmoon family
-
Detect Blackmoon payload
-
UAC bypass
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1