MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39ca34a2755de42be78cb183b932e50691bff55839f37ff7a407a2f25e16f035. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 39ca34a2755de42be78cb183b932e50691bff55839f37ff7a407a2f25e16f035
SHA3-384 hash: ec832ebe2fe31c777c8736766f61cee1fa6dad59cfb66f93ba9e3e1c5f45b0552da923aae40a5c694e957c8124d2fbf1
SHA1 hash: 5623c573b952d92fd5774330f967720f2fd4aa57
MD5 hash: 7ac2d7d6e279c747f14d4bf69f4d45da
humanhash: mango-delaware-september-low
File name:39CA34A2755DE42BE78CB183B932E50691BFF55839F37FF7A407A2F25E16F035
Download: download sample
Signature Blackmoon
File size:135'168 bytes
First seen:2021-02-09 15:01:43 UTC
Last seen:2021-02-09 17:13:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 09d0478591d4f788cb3e5ea416c25237 (4 x Worm.Mofksys, 3 x Blackmoon, 2 x Gh0stRAT)
ssdeep 3072:L0FHmfcqbqmQhTXnW0sDxKDuWR3owN/UJRo8dwebN:QNmt0tTslMuWR3dN8Tot
Threatray 2 similar samples on MalwareBazaar
TLSH 2BD3025516F40489D4C8D6304CEB49BDFA50BC0356A6F7DA27D03C2B4D3BDA7D92A32A
Reporter JAMESWT_WT
Tags:Blackmoon

Intelligence


File Origin
# of uploads :
2
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
39CA34A2755DE42BE78CB183B932E50691BFF55839F37FF7A407A2F25E16F035
Verdict:
Malicious activity
Analysis date:
2020-10-27 10:12:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows directory
Sending a UDP request
Enabling the 'hidden' option for analyzed file
Forced shutdown of a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 350612 Sample: EhPMt2dWBJ Startdate: 09/02/2021 Architecture: WINDOWS Score: 100 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Machine Learning detection for sample 2->46 48 2 other signatures 2->48 7 EhPMt2dWBJ.exe 1 1 2->7         started        10 EhPMt2dWBJ.exe 1 1 2->10         started        12 EhPMt2dWBJ.exe 1 1 2->12         started        14 3 other processes 2->14 process3 signatures4 50 Detected unpacking (changes PE section rights) 7->50 52 Contains functionality to inject code into remote processes 7->52 54 Writes to foreign memory regions 7->54 56 Tries to detect virtualization through RDTSC time measurements 7->56 16 comp.exe 2 12 7->16         started        58 Allocates memory in foreign processes 10->58 60 Injects a PE file into a foreign processes 10->60 20 comp.exe 12 10->20         started        22 comp.exe 12 12->22         started        24 comp.exe 12->24         started        26 comp.exe 14->26         started        28 comp.exe 12 14->28         started        30 comp.exe 14->30         started        process5 dnsIp6 34 users.qzone.qq.com 58.250.136.113, 80 UNICOM-SHENZHEN-IDCChinaUnicomGuangdongIPnetworkCN China 16->34 36 127.0.0.1 unknown unknown 16->36 38 prda.aadg.msidentity.com 16->38 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->40 32 WerFault.exe 23 9 26->32         started        signatures7 process8
Threat name:
Win32.Trojan.Blamon
Status:
Malicious
First seen:
2016-01-15 03:41:01 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence upx
Behaviour
Modifies Internet Explorer settings
Modifies Internet Explorer start page
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops file in Drivers directory
UPX packed file
Unpacked files
SH256 hash:
7ded199396ee3aad3c3e1b95772f67291797930de3193c3b086dfc140c6f7268
MD5 hash:
a7eab7d437d42d9b3d5f058886c5e1e0
SHA1 hash:
b45ad8e31b237a7c5859e64c46a43b20bc276017
Detections:
win_krbanker_auto
SH256 hash:
79b5801ae6336263bb28661802bb057a5d65b51112e94619ea0841767b937282
MD5 hash:
83f56486b13f7a4ca70582b685478a16
SHA1 hash:
2397e5514d50cff798350d56fa358f3263000c12
SH256 hash:
39ca34a2755de42be78cb183b932e50691bff55839f37ff7a407a2f25e16f035
MD5 hash:
7ac2d7d6e279c747f14d4bf69f4d45da
SHA1 hash:
5623c573b952d92fd5774330f967720f2fd4aa57
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_krbanker_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments