General

  • Target

    Vape V4.08.bin

  • Size

    12.3MB

  • Sample

    220710-qc7xbsbegj

  • MD5

    8a6e94a3f25c16c3589b5d285241aea0

  • SHA1

    621e46fa5c5f6c16a4335e4d9cc246b74b92b22a

  • SHA256

    e03193692369abba7bce150aa3d954d6d72653b6eaa64da050ef0b9bbd3cf8b1

  • SHA512

    eb9e8a7857c060d4283c93a2144d579d183859a6a40b1c0218c7b883571f0d38852710a7e2ad4f6da125ebd7036c594ba72a47f171c243fc74933d331b701571

Malware Config

Targets

    • Target

      Vape V4.08.bin

    • Size

      12.3MB

    • MD5

      8a6e94a3f25c16c3589b5d285241aea0

    • SHA1

      621e46fa5c5f6c16a4335e4d9cc246b74b92b22a

    • SHA256

      e03193692369abba7bce150aa3d954d6d72653b6eaa64da050ef0b9bbd3cf8b1

    • SHA512

      eb9e8a7857c060d4283c93a2144d579d183859a6a40b1c0218c7b883571f0d38852710a7e2ad4f6da125ebd7036c594ba72a47f171c243fc74933d331b701571

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

3
T1112

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Remote System Discovery

1
T1018

Tasks