General

  • Target

    9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634

  • Size

    180KB

  • Sample

    230408-hw1clacc33

  • MD5

    c874f6337df1d8205b7972eb329d62a4

  • SHA1

    862f07f883d1804f0cfc557a0017319c1e3d083d

  • SHA256

    9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634

  • SHA512

    d90884fb2e77dd986bacd979330073dbb2daddde7f45187d6f464b88f4cb40fc04f512dbb885df90145eae6d1a189476d1aa24952ef52393c7241be8874f9df0

  • SSDEEP

    3072:UJfyTicyCTvl/iwRtpXTnamb0E2HIIO0FEpzY8NmYvWrEjYzu3aWuIo/3ZJ8fS7Q:U41yclqLmwjTqVNmYv3MzAuIoXkSi39e

Malware Config

Targets

    • Target

      9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634

    • Size

      180KB

    • MD5

      c874f6337df1d8205b7972eb329d62a4

    • SHA1

      862f07f883d1804f0cfc557a0017319c1e3d083d

    • SHA256

      9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634

    • SHA512

      d90884fb2e77dd986bacd979330073dbb2daddde7f45187d6f464b88f4cb40fc04f512dbb885df90145eae6d1a189476d1aa24952ef52393c7241be8874f9df0

    • SSDEEP

      3072:UJfyTicyCTvl/iwRtpXTnamb0E2HIIO0FEpzY8NmYvWrEjYzu3aWuIo/3ZJ8fS7Q:U41yclqLmwjTqVNmYv3MzAuIoXkSi39e

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks