General

  • Target

    17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489

  • Size

    324KB

  • Sample

    230314-ew2nwafd4w

  • MD5

    1c22fa80322fd53bae02ed3e7524fc0c

  • SHA1

    466acd7212820c57379fd830f83d9419810d2ba0

  • SHA256

    17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489

  • SHA512

    e4fe4b0f80a96d5ec474e7f12a6fb7ab5ae5fefc6b75fcbf5ba7c9fb4e3baeb40bfc0c8605a0d84f3cf961be47fff38ff026e608f0868d89fba0dc414f51b461

  • SSDEEP

    6144:x303mYR98V8WvmSbW63MQJyCZc2fZvQ11/N7gTZAAypRVzspp627gQG:23mQ8zeSd3fYdOy/mWX7682bG

Malware Config

Targets

    • Target

      17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489

    • Size

      324KB

    • MD5

      1c22fa80322fd53bae02ed3e7524fc0c

    • SHA1

      466acd7212820c57379fd830f83d9419810d2ba0

    • SHA256

      17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489

    • SHA512

      e4fe4b0f80a96d5ec474e7f12a6fb7ab5ae5fefc6b75fcbf5ba7c9fb4e3baeb40bfc0c8605a0d84f3cf961be47fff38ff026e608f0868d89fba0dc414f51b461

    • SSDEEP

      6144:x303mYR98V8WvmSbW63MQJyCZc2fZvQ11/N7gTZAAypRVzspp627gQG:23mQ8zeSd3fYdOy/mWX7682bG

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks