MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 917169fa1896e089d2edefc1feb59dbfc9c461b973461e7b1e9d38a1ae4ad164. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 13


Intelligence 13 IOCs YARA 8 File information Comments

SHA256 hash: 917169fa1896e089d2edefc1feb59dbfc9c461b973461e7b1e9d38a1ae4ad164
SHA3-384 hash: 732929eae27740779563b484beace024badd65de2148e8ca87c8f83f636aaf2973f3496d91a2093b6c3945c34deb804a
SHA1 hash: a4a315a56f9ce8b55ffcb1f4d780d1d72ec4e111
MD5 hash: cccdafb28f7c846219a8f150bead37a9
humanhash: mountain-leopard-maryland-football
File name:SecuriteInfo.com.Trojan.PWS.Wsgame.56228.30656.10153
Download: download sample
Signature Blackmoon
File size:1'076'224 bytes
First seen:2025-07-05 14:40:29 UTC
Last seen:2025-07-05 15:49:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 98ee450359fb8eda1fdf6c76521f661e (2 x Blackmoon, 1 x Sality)
ssdeep 24576:8yEOUslemq04P5AOoBeOa/oBj2FlaJVJZ65:MsrqHoBeOa/oIaJs
TLSH T190352302D1B62E93D93B8538F33965E3E44E8D0658565063BA6EFF8902F9BF07981D07
TrID 41.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
25.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
10.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon a2a2aeaeaeaeaee0 (2 x Blackmoon, 1 x Sality)
Reporter SecuriteInfoCom
Tags:Blackmoon exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
16
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
rl_917169fa1896e089d2edefc1feb59dbfc9c461b973461e7b1e9d38a1ae4ad164
Verdict:
Malicious activity
Analysis date:
2025-07-05 14:51:37 UTC
Tags:
blackmoon upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscated injection packed
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 microsoft_visual_cc overlay packed packed packed packed upx zero
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2025-07-05 14:41:22 UTC
File Type:
PE (Exe)
Extracted files:
75
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery upx
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
System Location Discovery: System Language Discovery
UPX packed file
Unpacked files
SH256 hash:
917169fa1896e089d2edefc1feb59dbfc9c461b973461e7b1e9d38a1ae4ad164
MD5 hash:
cccdafb28f7c846219a8f150bead37a9
SHA1 hash:
a4a315a56f9ce8b55ffcb1f4d780d1d72ec4e111
SH256 hash:
10099e9434e12844a8afab0cdcd216c9540205da8a0adb6943e1d67f733ff42c
MD5 hash:
14a29a0c07621e62ca1e3fb60069cf18
SHA1 hash:
ea8a5214ce0ae88e7579255c3edd36db6f9195b3
Detections:
BlackmoonBanker MALWARE_Win_BlackMoon
SH256 hash:
a5d4ee431dd23ac644520efd6e12f23bc71941e9cad83dc16ff1ccc5a4f66809
MD5 hash:
e7913ae33841e91d215a7c71ed081cf2
SHA1 hash:
197fb673bf0e53ce3f5017d1d356949aa5f2caaa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Blackmoon

Executable exe 917169fa1896e089d2edefc1feb59dbfc9c461b973461e7b1e9d38a1ae4ad164

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
MULTIMEDIA_APICan Play MultimediaWINMM.dll::waveOutOpen
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments