General

  • Target

    a7eb0edfcc0c0247281d6b54da5d98b6903ba481749bfc6567401ff795c13739

  • Size

    131KB

  • Sample

    221127-sp7s7sgc42

  • MD5

    46e97cdad3fc2b23d7588b8d110f7495

  • SHA1

    4a23f517063dc3cba8df37f70316f36389e8d641

  • SHA256

    a7eb0edfcc0c0247281d6b54da5d98b6903ba481749bfc6567401ff795c13739

  • SHA512

    cf1cd2aaff22dda175d1d537f9d16775c3e64675bbf2aab04a61fea76fb1ed25ad079bf468dde9f1c7c6b3343838e0b62c67819bd4f9d975fddedb85473ae979

  • SSDEEP

    3072:AJ2I9YywaK+EjIQ+MIXJdSqLBRnpJtj9oEzout:AJ2IXw8wIFpzhoEzoS

Malware Config

Targets

    • Target

      a7eb0edfcc0c0247281d6b54da5d98b6903ba481749bfc6567401ff795c13739

    • Size

      131KB

    • MD5

      46e97cdad3fc2b23d7588b8d110f7495

    • SHA1

      4a23f517063dc3cba8df37f70316f36389e8d641

    • SHA256

      a7eb0edfcc0c0247281d6b54da5d98b6903ba481749bfc6567401ff795c13739

    • SHA512

      cf1cd2aaff22dda175d1d537f9d16775c3e64675bbf2aab04a61fea76fb1ed25ad079bf468dde9f1c7c6b3343838e0b62c67819bd4f9d975fddedb85473ae979

    • SSDEEP

      3072:AJ2I9YywaK+EjIQ+MIXJdSqLBRnpJtj9oEzout:AJ2IXw8wIFpzhoEzoS

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks