General

  • Target

    tfccltd.exe

  • Size

    292KB

  • Sample

    220722-pea5psfccn

  • MD5

    a1bfff3769a3962c5075e041c1c937b3

  • SHA1

    2936ad4944f553277842155b0de2aa5f43d741fb

  • SHA256

    ae8369a28b53ba7e283436a65c211ef032af555515fb961e6cb0c56c635d1834

  • SHA512

    31eb0d602e1621b40cbc27acc85ac96eae2ab5d11d074fd13df2e08501c55bce328e75acb53ac666d4135246e018e85ac90e2a8b3099deb0d148c9e88186b7c5

Malware Config

Targets

    • Target

      tfccltd.exe

    • Size

      292KB

    • MD5

      a1bfff3769a3962c5075e041c1c937b3

    • SHA1

      2936ad4944f553277842155b0de2aa5f43d741fb

    • SHA256

      ae8369a28b53ba7e283436a65c211ef032af555515fb961e6cb0c56c635d1834

    • SHA512

      31eb0d602e1621b40cbc27acc85ac96eae2ab5d11d074fd13df2e08501c55bce328e75acb53ac666d4135246e018e85ac90e2a8b3099deb0d148c9e88186b7c5

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Scanning

1
T1046

Tasks