Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 15:31

General

  • Target

    防ping端口检测.exe

  • Size

    292KB

  • MD5

    bf8c1bad362d004fc40a91362e93e1a4

  • SHA1

    0d43350e240b1bc51fa8498d595b16edd13949b8

  • SHA256

    75728bca33d989aa4a2a75880f3039c5928b17f13dde39891d21c4f954fedacc

  • SHA512

    629cb314f198e13de2fed0c4efae37c6e86e48090a369a1b66524b3febecb389b2a64393f7afd776088d5c9b1a2a36d8cdb53ae65ea86a15d572d5c6cbd9105e

  • SSDEEP

    3072:bMBSA1vJcAGOziLEIfYOcZwcHPtNjRw7pllC0WDQjv1yk/t9jCZ+QxYbdVQlllll:bHAJJcAGO/IfYOcyKRw7

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\防ping端口检测.exe
    "C:\Users\Admin\AppData\Local\Temp\防ping端口检测.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1228-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/1228-55-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB