General

  • Target

    f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20

  • Size

    1.0MB

  • Sample

    230523-c94paaed4y

  • MD5

    4fbedfd99b1cb6e277f30dd417f7cf7c

  • SHA1

    6bdb8457a3a398ca60c1e7ddd7b0744bb1678a5a

  • SHA256

    f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20

  • SHA512

    efd9f1e0f537da25beaa4404f769f8c25668f4746d9323b348bfc30fbaeab02ebcb045f48604e1b66f5a13ab880d4374d33ba655e823603ea8ee83df722d7ff7

  • SSDEEP

    12288:v/FOT61RTcnMbA/+Lkv+I7lVvWdtFuUqZLRm:n4AS2A/+LS+wM

Malware Config

Targets

    • Target

      f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20

    • Size

      1.0MB

    • MD5

      4fbedfd99b1cb6e277f30dd417f7cf7c

    • SHA1

      6bdb8457a3a398ca60c1e7ddd7b0744bb1678a5a

    • SHA256

      f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20

    • SHA512

      efd9f1e0f537da25beaa4404f769f8c25668f4746d9323b348bfc30fbaeab02ebcb045f48604e1b66f5a13ab880d4374d33ba655e823603ea8ee83df722d7ff7

    • SSDEEP

      12288:v/FOT61RTcnMbA/+Lkv+I7lVvWdtFuUqZLRm:n4AS2A/+LS+wM

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks