General

  • Target

    e2ef236bed554deb32964045130011894fbccd240d7d20d5992e81366fb71f4b

  • Size

    2.1MB

  • Sample

    221123-yzvvaabe52

  • MD5

    0287e13e0df148a77e8e0b829918ea13

  • SHA1

    c02d090847f4e91423e98a2857c696fa2be802e3

  • SHA256

    e2ef236bed554deb32964045130011894fbccd240d7d20d5992e81366fb71f4b

  • SHA512

    bbe4877d88a1903ce3bbf165b3e4545c46a993d030d9ae491cdc5d0f742926a36cb43cf5d309bc9c997c9d8d5acb9fd9825b091bba187162a45bb9410bea2575

  • SSDEEP

    49152:N+Bp091F1Eu/4opVwg3DT6KvN2Ne1O1ez4Br0ORZCfBV3U6g:ABK9Cu/dwg3KqEBrbRZG3U6

Malware Config

Targets

    • Target

      e2ef236bed554deb32964045130011894fbccd240d7d20d5992e81366fb71f4b

    • Size

      2.1MB

    • MD5

      0287e13e0df148a77e8e0b829918ea13

    • SHA1

      c02d090847f4e91423e98a2857c696fa2be802e3

    • SHA256

      e2ef236bed554deb32964045130011894fbccd240d7d20d5992e81366fb71f4b

    • SHA512

      bbe4877d88a1903ce3bbf165b3e4545c46a993d030d9ae491cdc5d0f742926a36cb43cf5d309bc9c997c9d8d5acb9fd9825b091bba187162a45bb9410bea2575

    • SSDEEP

      49152:N+Bp091F1Eu/4opVwg3DT6KvN2Ne1O1ez4Br0ORZCfBV3U6g:ABK9Cu/dwg3KqEBrbRZG3U6

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Tasks