MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98e4329d418e085edef489875df98f75e772d3d5f96178682e953566e408f525. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 98e4329d418e085edef489875df98f75e772d3d5f96178682e953566e408f525
SHA3-384 hash: 2ba72f60487ece87b50ecfb26cdff6f90db0588ef8ed8ebfae25bca0352d6ae3675c78fda86908a6d7a69485664aed56
SHA1 hash: 1fa5bf901faae6285cc87b50a1370a2334c45490
MD5 hash: 10e0faa56a7747e8e285fdbad177e517
humanhash: florida-lion-bulldog-steak
File name:国家队.vmp.exe
Download: download sample
Signature Blackmoon
File size:8'380'416 bytes
First seen:2021-02-09 14:52:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b98bd4099f8f894565e16c613641fb75 (1 x Blackmoon)
ssdeep 196608:Mm14PxH5yk6lwPgmwgWwNdwLvgpKqyCdT4ZIjyP8mbvCRfay:H45wkkwPgmNWwoCqIuEGvCFa
TLSH 48863317716B69CAD0F37179DA7006DE7ABBB0C0A1327DBC411E229523D9490BEBB1D2
Reporter vm001cn
Tags:Blackmoon exe RAT VMProtect

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
国家队.vmp.exe
Verdict:
Malicious activity
Analysis date:
2021-02-09 14:37:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected VMProtect packer
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Behaviour
Behavior Graph:
Threat name:
Win32.Packed.VHOConvagent
Status:
Malicious
First seen:
2021-02-09 14:53:10 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
24 of 29 (82.76%)
Threat level:
  1/5
Verdict:
suspicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx vmprotect
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
UPX packed file
Unpacked files
SH256 hash:
116c891b494468f6090aad453756c46c47d925e406037478f649ec824a79a874
MD5 hash:
695595a386e9b2ff59cf6989d3c4e5a1
SHA1 hash:
f43c1604a9576ce699bd0b651dd3f4c46167d907
SH256 hash:
9bd2d2b9f0ba9b1f873dfe3ebfa4cd7589eacf4062c3fd95e022287270e68e3b
MD5 hash:
5ca8740a95584ab55de000c604d17f7e
SHA1 hash:
cdf0b38ab59dcb3d4f1d0dc8f006997a1375d949
SH256 hash:
70eb127f5a6fe9bde3725265b13d7b220a66aa5fd12343efdbd56801c34a4fed
MD5 hash:
1d2e3a997f7e290419ccf1d33fbfbced
SHA1 hash:
03226c5322df7ff83f818df2e579fcd1c461ae3c
SH256 hash:
98e4329d418e085edef489875df98f75e772d3d5f96178682e953566e408f525
MD5 hash:
10e0faa56a7747e8e285fdbad177e517
SHA1 hash:
1fa5bf901faae6285cc87b50a1370a2334c45490
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments