General

  • Target

    db2553040e811ba751cf7188a7f1594bfd90cbde680ea1dfa32ce73bc5352fd8

  • Size

    2.2MB

  • Sample

    220802-q99r7aggfr

  • MD5

    5dbc38e00d2611a75853c14ccec78e43

  • SHA1

    ffd281f0d5b9190ca25ec73b8ef6b555b1727150

  • SHA256

    db2553040e811ba751cf7188a7f1594bfd90cbde680ea1dfa32ce73bc5352fd8

  • SHA512

    febab3f2562305b263c52dced6bc1e89e0ca484f9ac7beafd306540a1189ea5e093953ee6abf594bee85e0ad796e7f7cc57cb341c91230f6a0b8a0501e19a8c2

Malware Config

Targets

    • Target

      db2553040e811ba751cf7188a7f1594bfd90cbde680ea1dfa32ce73bc5352fd8

    • Size

      2.2MB

    • MD5

      5dbc38e00d2611a75853c14ccec78e43

    • SHA1

      ffd281f0d5b9190ca25ec73b8ef6b555b1727150

    • SHA256

      db2553040e811ba751cf7188a7f1594bfd90cbde680ea1dfa32ce73bc5352fd8

    • SHA512

      febab3f2562305b263c52dced6bc1e89e0ca484f9ac7beafd306540a1189ea5e093953ee6abf594bee85e0ad796e7f7cc57cb341c91230f6a0b8a0501e19a8c2

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks