Malware Analysis project
Malware Analysis project
STATIC ANALYSIS
Virus Total
The Malware sample was download from www.malwarebazaar.com and analyzed with
Virus total as shown in Figure 1, Figure 2, and Figure 3
The Malware was analyzed through HASHCALC utility to generate hashes as shown in
Figure 4
The Malware was analyzed through PEid tool to verify the packer. It was revealed the
malware was packed using Microsoft .Net. It also provided information regarding
Entrypoint and file offset. as shown in Figure 5
Similarly, the malware was analyzed using PE Detector utility to confirm the packing
software and / or the tool it was written in. As shown in Figure 6
Now, the malware was processed with BinText utility to download the strings in the
malware. The result was very large so, string with 8 x characters or more were filtered
and analyzed. As shown in Figure 7. The strings file is also attached as Anx A.
Similarly to find the strings of interest, CMDER utility was used and strings with http
were searched. The result is shown in Figure 8
Further analyzing the strings, FLOSS was used to decode the strings as shown in
Figure 9
Now, to further analyze the malware, it was processed with IDA freeware to inspect its
assembly code. as shown in Figure 10
IDA Freeware also provided the functions this malware imports. The functions included
registry functions to manipulate the registry along with gui libraries to display the
message. as shown in Figure 11
The PE studio also indicated that this malware is usually classified as a Ransonware, as
shown in Figure 13
At the end, Regshot utility was used to identify the changes made in registry by the
malware and the results are attached as Anx B
12
Dynamic Analysis
The Dynamic Analysis of Blackmoon malware was performed using any.run sandbox.
The results indicated that
It is a packed malware and acts as a dropper. It immediately drops the malicious code
after execution.
It didn’t make any connection with external C2 server probably because till the analysis
of the malware, it didn’t make any requests for connection with its C2 server.
2 x malicious processes were identified.
Detailed report is attached as Anx C
13
Findings
Blackmoon is a dropper malware.
It makes multiple registry changes to install its code and then redirect the traffic to
its own servers.
It also deletes the registry keys.
It was packed by Microsoft .Net packer and was not entirely obfuscated except few
strings.
It didn’t contact any C2 server during the analysis however, Virustotal claims it
makes connections to C2 server.
This malware is detectable by well known Antivirus solutions and hence easily
detectable.