MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 28c815d0b6262ea2a20fbeea9a04b89db035131981ea8925cd12e3ed414a6d62. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 28c815d0b6262ea2a20fbeea9a04b89db035131981ea8925cd12e3ed414a6d62
SHA3-384 hash: f819a5c90de7d938c07406fad661fc748ab6d5254dd97bd3b3482b030bee87f5c09e7869486e0bb5ee0425ace337a8ef
SHA1 hash: f6cc36297987662c2a432fb658af92a9d5974029
MD5 hash: 2e8f9db862550d35cc89fec86bb4ae85
humanhash: echo-fanta-fix-stream
File name:CB1.exe
Download: download sample
Signature Blackmoon
File size:1'763'840 bytes
First seen:2024-11-21 09:29:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 56fe90248c9abd2efac79986b10bd425 (3 x Blackmoon)
ssdeep 24576:ivnIiCUIw+1Tg6zPk84mFGFWsuC1YmSD4SlDCG4QnZ4v/KEVosEi/K973y4WIV:iAQP+hgWPkcfsbC4aeteZMyxXM4
TLSH T17D85331D4A41E157DA5684387F0883261C91A7AE89FF39E4BA1DF88DC8283FDE447D93
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Joker
Tags:Blackmoon exe malware

Intelligence


File Origin
# of uploads :
1
# of downloads :
382
Origin country :
GR GR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
CB1.exe
Verdict:
Malicious activity
Analysis date:
2024-11-21 09:34:35 UTC
Tags:
blackmoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
blackmoon injection packed virus
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
microsoft_visual_cc packed packed packer_detected upx
Result
Threat name:
BlackMoon
Detection:
malicious
Classification:
rans.evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected BlackMoon Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.BlackMoon
Status:
Malicious
First seen:
2024-11-21 09:30:05 UTC
File Type:
PE (Exe)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
krbanker
Similar samples:
Result
Malware family:
blackmoon
Score:
  10/10
Tags:
family:blackmoon banker discovery trojan
Behaviour
Suspicious use of SetWindowsHookEx
System Location Discovery: System Language Discovery
Blackmoon family
Blackmoon, KrBanker
Detect Blackmoon payload
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
ce1b18ab42ce7af169cb3874235d9676f2d54f0ecdb89c038985891e7b8ee05e
MD5 hash:
c2bbb986a361b5ac1b0aff5aad432c73
SHA1 hash:
305e0c43db15794ce92f8f0d078b68106756cfdc
SH256 hash:
73be24293cae0def93d4083fb77bbae5bbb0896c630ce4fcbda2a0fa311f2a6d
MD5 hash:
5c01ef9b7a45ce14dd0fa2a9d69e8374
SHA1 hash:
ed5c21797cf0e8ab28f6702c8aec0d147366eb68
Detections:
BlackmoonBanker MALWARE_Win_BlackMoon
SH256 hash:
28c815d0b6262ea2a20fbeea9a04b89db035131981ea8925cd12e3ed414a6d62
MD5 hash:
2e8f9db862550d35cc89fec86bb4ae85
SHA1 hash:
f6cc36297987662c2a432fb658af92a9d5974029
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Blackmoon

Executable exe 28c815d0b6262ea2a20fbeea9a04b89db035131981ea8925cd12e3ed414a6d62

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
RAS_APIUses Remote AccessRASAPI32.dll::RasHangUpA
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments