General

  • Target

    fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c

  • Size

    311KB

  • Sample

    221125-yay6eaae46

  • MD5

    3acae02fcb29940d3473010c8a2a9cbd

  • SHA1

    c843ad5ff8b01eafe64ecad030beb24fd336a8dc

  • SHA256

    fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c

  • SHA512

    212ac5b1cedc571541e18a8a67f02309612a7e242a08fe66a0e549ca616d1bf885658f8342d23e6e9f5b9200a4eb6f43e63d3fe86198c59f3e250dad9adae6d7

  • SSDEEP

    6144:OUfoCVoAqF5gxYLQPfcwSVyqFoSZYV/2Jzid+mzk7A1j:OYnKF5gcQHLioSWc7m

Malware Config

Targets

    • Target

      fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c

    • Size

      311KB

    • MD5

      3acae02fcb29940d3473010c8a2a9cbd

    • SHA1

      c843ad5ff8b01eafe64ecad030beb24fd336a8dc

    • SHA256

      fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c

    • SHA512

      212ac5b1cedc571541e18a8a67f02309612a7e242a08fe66a0e549ca616d1bf885658f8342d23e6e9f5b9200a4eb6f43e63d3fe86198c59f3e250dad9adae6d7

    • SSDEEP

      6144:OUfoCVoAqF5gxYLQPfcwSVyqFoSZYV/2Jzid+mzk7A1j:OYnKF5gcQHLioSWc7m

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks