General

  • Target

    f17a32f959519edf781370c452c995e99c3c1b67049204a0ff010a377d3a0c5c

  • Size

    359KB

  • Sample

    230602-ywjylsec29

  • MD5

    38c7439ad0a854c40af9f60532a5d082

  • SHA1

    46119a9614ceb26cb9259365367918adfe1171c4

  • SHA256

    f17a32f959519edf781370c452c995e99c3c1b67049204a0ff010a377d3a0c5c

  • SHA512

    347241e51f442ccf4d74b79c192d401a928e20c557a4b51981d0d95c3e07be62e6fdb71746bd995b7d28c309f5c0eaf8f2cee6304c8423f5ad6f5ad9c4861e31

  • SSDEEP

    6144:niF5O8bZk/FwD82Hdmg0Vy7uN5CVXrioW4YEBRVtat/l5r:no5D9k/+/iv2FYEzVtaD5r

Malware Config

Targets

    • Target

      f17a32f959519edf781370c452c995e99c3c1b67049204a0ff010a377d3a0c5c

    • Size

      359KB

    • MD5

      38c7439ad0a854c40af9f60532a5d082

    • SHA1

      46119a9614ceb26cb9259365367918adfe1171c4

    • SHA256

      f17a32f959519edf781370c452c995e99c3c1b67049204a0ff010a377d3a0c5c

    • SHA512

      347241e51f442ccf4d74b79c192d401a928e20c557a4b51981d0d95c3e07be62e6fdb71746bd995b7d28c309f5c0eaf8f2cee6304c8423f5ad6f5ad9c4861e31

    • SSDEEP

      6144:niF5O8bZk/FwD82Hdmg0Vy7uN5CVXrioW4YEBRVtat/l5r:no5D9k/+/iv2FYEzVtaD5r

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks