General

  • Target

    229a5042c07864exeexeexeex.exe

  • Size

    4.8MB

  • Sample

    230706-nn9h7aac95

  • MD5

    229a5042c078645049abdee89ef8a793

  • SHA1

    f25bd58525a3c15211ae0d03b5cff074c9486b61

  • SHA256

    01ab5fdfaa5531f9c266d15266ef7a0e5bf6ec7017eb05a527e248d3c7c3c28b

  • SHA512

    3ad768542921e6956645d609f63902f74bf3c777aee5c468f8f71ca567573dfefa5e51487ea6df3c11c4ccb56f75cd3e6c91cad571a3967bc3f0f1703364ba01

  • SSDEEP

    98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVR:dGpmGpUZCby0Wy3V

Malware Config

Targets

    • Target

      229a5042c07864exeexeexeex.exe

    • Size

      4.8MB

    • MD5

      229a5042c078645049abdee89ef8a793

    • SHA1

      f25bd58525a3c15211ae0d03b5cff074c9486b61

    • SHA256

      01ab5fdfaa5531f9c266d15266ef7a0e5bf6ec7017eb05a527e248d3c7c3c28b

    • SHA512

      3ad768542921e6956645d609f63902f74bf3c777aee5c468f8f71ca567573dfefa5e51487ea6df3c11c4ccb56f75cd3e6c91cad571a3967bc3f0f1703364ba01

    • SSDEEP

      98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVR:dGpmGpUZCby0Wy3V

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks