MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44abf0cadee82f049bbc3dfeb8277529d3650f6f76fb76e00ec65228b8ec21e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 5


Intelligence 5 IOCs YARA 13 File information Comments

SHA256 hash: 44abf0cadee82f049bbc3dfeb8277529d3650f6f76fb76e00ec65228b8ec21e6
SHA3-384 hash: 368b4dac78428fda661fafbe2d75ae019803890eacdfd11781a245b6dbaedee7c7298004617d6105fc475c40069ce5ab
SHA1 hash: 6926da5cba7aed9eb370b338e38990c0268668ee
MD5 hash: 3da317519de2f2dea02bb16894317051
humanhash: six-coffee-sodium-carolina
File name:sutup-Chrome.13.26.x64.zip
Download: download sample
Signature Blackmoon
File size:15'883'875 bytes
First seen:2024-04-26 10:50:44 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 393216:3LXgE3gw94y+TBxJhVAa6Q03eE2ytIy963gHe8swneCMjeD4:bQEITJX/yAQ+8Nn8
TLSH T1E2F633BB275DFE649EF111747C69741F6A683B03FEE83421F2589E87501826AF038663
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter NDA0E
Tags:Blackmoon SilverFox zip


Avatar
NDA0E
SilverFox C2s:
hm2.webcamcn.xyz
156.248.54.11.webcamcn.xyz
156.248.54.11:80
216.224.125.193:443

Intelligence


File Origin
# of uploads :
1
# of downloads :
350
Origin country :
NL NL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:sutup-Chrome.13.26.x64.msi
File size:16'345'600 bytes
SHA256 hash: bd462515ea9ffe66fc27d9baa0fcc4bf733385829c2fc5676129aaeeb2e0af88
MD5 hash: 86561e111e7ce97e13a9936b9b4ba849
MIME type:application/x-msi
Signature Blackmoon
Vendor Threat Intelligence
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion persistence spyware stealer
Behaviour
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Executes dropped EXE
Launches sc.exe
Loads dropped DLL
Registers COM server for autorun
Checks computer location settings
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates connected drives
Modifies Windows Firewall
Sets file execution options in registry
Reads user/profile data of web browsers
Creates new service(s)
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:blackmoon_payload_v1
Author:RandomMalware
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_BlackMoon
Author:ditekSHen
Description:Detects executables using BlackMoon RunTime
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Blackmoon

zip 44abf0cadee82f049bbc3dfeb8277529d3650f6f76fb76e00ec65228b8ec21e6

(this sample)

  
Delivery method
Distributed via web download

Comments