General

  • Target

    05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177

  • Size

    621KB

  • Sample

    230301-q3wa8agd57

  • MD5

    f1431899005a9b9758c9c1f912d65e45

  • SHA1

    3ebb66d5ff5b93311767faf3a161f7c07f11abaf

  • SHA256

    05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177

  • SHA512

    13c06f02b52b2ef31f21d6f7a44cc6bf170bbc2fdc41076be447ce65fcc767322085aa3a52444d7c0582ef796925b493623d65422c165630e60cf29c694755e4

  • SSDEEP

    6144:tjSO819X2yfwbS/ZCswouPe2vif6JmbPEjuQMyWfsYg4Lab:YO81F6+UswS2v26JmLNY83g4e

Malware Config

Targets

    • Target

      05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177

    • Size

      621KB

    • MD5

      f1431899005a9b9758c9c1f912d65e45

    • SHA1

      3ebb66d5ff5b93311767faf3a161f7c07f11abaf

    • SHA256

      05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177

    • SHA512

      13c06f02b52b2ef31f21d6f7a44cc6bf170bbc2fdc41076be447ce65fcc767322085aa3a52444d7c0582ef796925b493623d65422c165630e60cf29c694755e4

    • SSDEEP

      6144:tjSO819X2yfwbS/ZCswouPe2vif6JmbPEjuQMyWfsYg4Lab:YO81F6+UswS2v26JmLNY83g4e

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks