General

  • Target

    b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9

  • Size

    682KB

  • Sample

    230314-evh55sfd2x

  • MD5

    7562211a68b8c6410156a404fdde44da

  • SHA1

    3a102d31ea2e1056712de3e8a195dae6cb986d03

  • SHA256

    b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9

  • SHA512

    c6feca2a099c6a511bf9721fc334569b313f6d57ed8dec38a64c7ce28b3fea8450ba98fe15d970fe4b9b606a2ecf873d0012dd45a29a61a8f5562b7cc45ece49

  • SSDEEP

    12288:ISYfFx0mgDpkZLtU5K3+9KpdS+grSSHnaoRB4JyVDMXt:n4FxJtZxU5BCdS+vkr1VDM

Malware Config

Targets

    • Target

      b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9

    • Size

      682KB

    • MD5

      7562211a68b8c6410156a404fdde44da

    • SHA1

      3a102d31ea2e1056712de3e8a195dae6cb986d03

    • SHA256

      b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9

    • SHA512

      c6feca2a099c6a511bf9721fc334569b313f6d57ed8dec38a64c7ce28b3fea8450ba98fe15d970fe4b9b606a2ecf873d0012dd45a29a61a8f5562b7cc45ece49

    • SSDEEP

      12288:ISYfFx0mgDpkZLtU5K3+9KpdS+grSSHnaoRB4JyVDMXt:n4FxJtZxU5BCdS+vkr1VDM

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks