General

  • Target

    7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8

  • Size

    159KB

  • Sample

    230505-ygl5escd5s

  • MD5

    9817350719ad28a06cc16e638f4780f4

  • SHA1

    96a0a69291180ab55b20e6aafc09af8d6810c283

  • SHA256

    7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8

  • SHA512

    800db2672382b8f6f4f384e2b4a59a09b61ec7e87f1cb37adf51e0203e61e21c23c35fbb71541a59e42fe247ea083ab871bb85252ccfffee48232e8ccb46bd51

  • SSDEEP

    3072:SV8s89ENEbWT7NApW1aru+41GKe3ZvhYQ9SJ9BQt7QV2BS9t1ca/QclT7:SZbWWT7NAkJrpe3ZKWBt7QV2It1fl3

Malware Config

Targets

    • Target

      7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8

    • Size

      159KB

    • MD5

      9817350719ad28a06cc16e638f4780f4

    • SHA1

      96a0a69291180ab55b20e6aafc09af8d6810c283

    • SHA256

      7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8

    • SHA512

      800db2672382b8f6f4f384e2b4a59a09b61ec7e87f1cb37adf51e0203e61e21c23c35fbb71541a59e42fe247ea083ab871bb85252ccfffee48232e8ccb46bd51

    • SSDEEP

      3072:SV8s89ENEbWT7NApW1aru+41GKe3ZvhYQ9SJ9BQt7QV2BS9t1ca/QclT7:SZbWWT7NAkJrpe3ZKWBt7QV2It1fl3

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks