MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8e9838eef63bfca0af5e1d9704062c36c168d44a06d53c4d0560f5389f2a760. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Blackmoon


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: a8e9838eef63bfca0af5e1d9704062c36c168d44a06d53c4d0560f5389f2a760
SHA3-384 hash: b5f25158c56a9e68ccb7d5e888c8892ab6abcab998163ba26db6e67deae9b6be7b0e271474d4efb383bb9e5ea80e02ba
SHA1 hash: 53b5a92eed85fd08dae67978abfe0e8254c15451
MD5 hash: ce31c7fbda3ec7956327a742c68da537
humanhash: quebec-green-utah-iowa
File name:3.exe
Download: download sample
Signature Blackmoon
File size:22'382'592 bytes
First seen:2024-08-05 09:58:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 332f7ce65ead0adfb3d35147033aabe9 (81 x XRed, 18 x SnakeKeylogger, 7 x DarkComet)
ssdeep 393216:wfVPhYAAOfCx8hV7VGDEBm7GeXdXMOII/Ymr5Y1QNV5EROx/pr8FxYS0D/Eq3uej:AY2f9IQB2GzMvFYunhSxYfD/Eq+ej
TLSH T145373332BB91403AE2726B3D4C66B3B8D93CBE512D64395E36D92D8C9F7D2816D142C3
TrID 64.9% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
11.8% (.EXE) Win64 Executable (generic) (10523/12/4)
11.2% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
5.0% (.EXE) Win32 Executable (generic) (4504/4/1)
2.2% (.EXE) OS/2 Executable (generic) (2029/13)
dhash icon 1c828c988c0e8e0f (1 x Blackmoon)
Reporter vm001cn
Tags:Blackmoon exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
360
Origin country :
HK HK
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
3.exe
Verdict:
Malicious activity
Analysis date:
2024-08-05 10:00:53 UTC
Tags:
adware sogou dyndns ip-check

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Generic Infostealer Network Stealth Trojan Delphi
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Moving a recently created file
Searching for the window
Creating a file in the %temp% directory
Moving a file to the %temp% directory
Modifying an executable file
DNS request
Connection attempt
Sending an HTTP GET request
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Changing DNS server
Infecting executable files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd dropper evasive fingerprint keylogger lolbin macros macros-on-close macros-on-open packed remote shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
BlackMoon, XRed
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Detected VMProtect packer
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with functions possibly related to WSH operations (process, registry, environment, or keystrokes)
Drops PE files to the document folder of the user
Found driver which could be used to inject code into processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the DNS server
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample is protected by VMProtect
Tries to detect virtualization through RDTSC time measurements
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected BlackMoon Ransomware
Yara detected XRed
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1487925 Sample: 3.exe Startdate: 05/08/2024 Architecture: WINDOWS Score: 100 77 freedns.afraid.org 2->77 79 xred.mooo.com 2->79 81 7 other IPs or domains 2->81 99 Multi AV Scanner detection for domain / URL 2->99 101 Malicious sample detected (through community Yara rule) 2->101 103 Antivirus detection for URL or domain 2->103 107 19 other signatures 2->107 10 3.exe 1 6 2->10         started        13 svchost.exe 2->13         started        16 svchost.exe 2 2->16         started        18 13 other processes 2->18 signatures3 105 Uses dynamic DNS services 77->105 process4 dnsIp5 69 C:\Users\user\Desktop\._cache_3.exe, PE32 10->69 dropped 71 C:\ProgramData\Synaptics\Synaptics.exe, PE32 10->71 dropped 73 C:\ProgramData\Synaptics\RCXA074.tmp, PE32 10->73 dropped 75 C:\...\Synaptics.exe:Zone.Identifier, ASCII 10->75 dropped 21 ._cache_3.exe 2 10->21         started        25 Synaptics.exe 63 10->25         started        129 Changes security center settings (notifications, updates, antivirus, firewall) 13->129 28 MpCmdRun.exe 13->28         started        131 Query firmware table information (likely to detect VMs) 16->131 83 s-part-0032.t-0009.t-msedge.net 13.107.246.60, 443, 49895, 49896 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->83 85 127.0.0.1 unknown unknown 18->85 30 WerFault.exe 18->30         started        32 splwow64.exe 18->32         started        file6 signatures7 process8 dnsIp9 59 C:\Program Files (x86)behaviorgraphoogle\C2485384.exe, PE32 21->59 dropped 117 Antivirus detection for dropped file 21->117 119 Multi AV Scanner detection for dropped file 21->119 121 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 21->121 127 3 other signatures 21->127 34 C2485384.exe 16 75 21->34         started        93 freedns.afraid.org 69.42.215.252, 49709, 80 AWKNET-LLCUS United States 25->93 95 docs.google.com 142.250.185.174, 443, 49703, 49704 GOOGLEUS United States 25->95 97 drive.usercontent.google.com 142.250.185.65, 443, 49712, 49714 GOOGLEUS United States 25->97 61 C:\Users\user~1\...\q67hQckB.exe (copy), PE32 25->61 dropped 63 C:\Users\user\Documents\CZQKSDDMWR\~$cache1, PE32 25->63 dropped 65 C:\Users\user\AppData\Local\...\q67hQckB.exe, PE32 25->65 dropped 67 2 other malicious files 25->67 dropped 123 Drops PE files to the document folder of the user 25->123 125 Machine Learning detection for dropped file 25->125 39 WerFault.exe 25->39         started        41 conhost.exe 28->41         started        file10 signatures11 process12 dnsIp13 87 www.zhihu.com 34->87 89 www.tencent.com 34->89 91 83 other IPs or domains 34->91 51 C:\Windows\SysWOW64\A0E0ohaVQ.sys, PE32+ 34->51 dropped 53 C:\Windows\SysWOW64\A0A461yPs.sys, PE32+ 34->53 dropped 55 C:\Windows\SysWOW64\7361p1CQa.sys, PE32+ 34->55 dropped 57 21 other malicious files 34->57 dropped 109 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 34->109 111 Uses cmd line tools excessively to alter registry or file data 34->111 113 Modifies the DNS server 34->113 115 Sample is not signed and drops a device driver 34->115 43 reg.exe 34->43         started        45 reg.exe 34->45         started        file14 signatures15 process16 process17 47 conhost.exe 43->47         started        49 conhost.exe 45->49         started       
Gathering data
Threat name:
Win32.Trojan.Synaptics
Status:
Malicious
First seen:
2024-08-05 04:54:11 UTC
File Type:
PE (Exe)
Extracted files:
69
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence vmprotect
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
VMProtect packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:D1S1Gv11betaD1N
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:vbaproject_bin
Author:CD_R0M_
Description:{76 62 61 50 72 6f 6a 65 63 74 2e 62 69 6e} is hex for vbaproject.bin. Macros are often used by threat actors. Work in progress - Ran out of time
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteExA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessA
advapi32.dll::OpenProcessToken
kernel32.dll::OpenProcess
kernel32.dll::CloseHandle
wininet.dll::InternetCloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::TerminateProcess
kernel32.dll::LoadLibraryExA
kernel32.dll::LoadLibraryA
kernel32.dll::GetDriveTypeA
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CopyFileA
kernel32.dll::CreateDirectoryA
kernel32.dll::CreateFileA
kernel32.dll::CreateFileMappingA
kernel32.dll::DeleteFileA
kernel32.dll::MoveFileA
WIN_BASE_USER_APIRetrieves Account Informationkernel32.dll::GetComputerNameA
advapi32.dll::GetUserNameA
advapi32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegCreateKeyExA
advapi32.dll::RegNotifyChangeKeyValue
advapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
advapi32.dll::RegSetValueExA
WIN_SVC_APICan Manipulate Windows Servicesadvapi32.dll::OpenSCManagerA
WIN_USER_APIPerforms GUI Actionsuser32.dll::ActivateKeyboardLayout
user32.dll::CreateMenu
user32.dll::FindWindowA
user32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments