General

  • Target

    731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215

  • Size

    3.1MB

  • Sample

    221127-nmgrsagh7t

  • MD5

    f2733cc44798b9014af14f7bc7d280de

  • SHA1

    0f6a947f59710ef5dd197ed9ee02d00e72aef420

  • SHA256

    731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215

  • SHA512

    a03fc99fa026eaeac18fa1d3b0830eaeca4ee431601b9a752c31926a1a34589795faffb05a9c053e6ddd86dde335913a5ccf7b5a14055436c8bc341ac541aa31

  • SSDEEP

    98304:al94XfeyP6RDfyu8LSMyj0mdQ1820sJPLaYy/:al2X2yiNKtSTdQ18dsJP+

Malware Config

Targets

    • Target

      731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215

    • Size

      3.1MB

    • MD5

      f2733cc44798b9014af14f7bc7d280de

    • SHA1

      0f6a947f59710ef5dd197ed9ee02d00e72aef420

    • SHA256

      731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215

    • SHA512

      a03fc99fa026eaeac18fa1d3b0830eaeca4ee431601b9a752c31926a1a34589795faffb05a9c053e6ddd86dde335913a5ccf7b5a14055436c8bc341ac541aa31

    • SSDEEP

      98304:al94XfeyP6RDfyu8LSMyj0mdQ1820sJPLaYy/:al2X2yiNKtSTdQ18dsJP+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Tasks