General
-
Target
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094
-
Size
12.6MB
-
Sample
250422-b8wrlsz1az
-
MD5
c7860289e1b0c60f40f59ea7cd6b93f5
-
SHA1
5d5e65b98c51579d36967aad8930f8aff23b3f48
-
SHA256
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094
-
SHA512
4f8b1e255b04eaddad96bf65237fc8c7cbef71095dd8b171b3ab1a5e111ee8a2e63c55a77f8a3bd2977c16abb50f4ff3555d0876ce4d08848f9609bbeeccfd79
-
SSDEEP
98304:iy9afy9afy9afy9afy9afy9afy9afy9afy9a3WQtZ/K0tGOFWVRuLftCTfA38n0K:yWyZ/K0ttYVAATVX
Behavioral task
behavioral1
Sample
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094
-
Size
12.6MB
-
MD5
c7860289e1b0c60f40f59ea7cd6b93f5
-
SHA1
5d5e65b98c51579d36967aad8930f8aff23b3f48
-
SHA256
7930f71c989b91f5ff40b6c1fbfa62ae41221ecd0fb0fdea05ffd90c9faf6094
-
SHA512
4f8b1e255b04eaddad96bf65237fc8c7cbef71095dd8b171b3ab1a5e111ee8a2e63c55a77f8a3bd2977c16abb50f4ff3555d0876ce4d08848f9609bbeeccfd79
-
SSDEEP
98304:iy9afy9afy9afy9afy9afy9afy9afy9afy9a3WQtZ/K0tGOFWVRuLftCTfA38n0K:yWyZ/K0ttYVAATVX
-
Blackmoon family
-
Detect Blackmoon payload
-
UAC bypass
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1