General

  • Target

    0e2c16cdc36d83exe_JC.exe

  • Size

    4.8MB

  • Sample

    230713-ycaktsaf47

  • MD5

    0e2c16cdc36d835d88118303bb26e5d3

  • SHA1

    e6b25683dc672caae9852ff2e10556177d332ba6

  • SHA256

    83369bcba7d00547a923021e5015037cbb219980cf77b39477127399d7bdc4c7

  • SHA512

    17635edb162a648dbc3fbae05b9ae0c74071c3b98436b05737969ee57899fac286b725dbb914ddc5b54184fbc2b190fa36b1923ccba999bc4334b46da8a41cce

  • SSDEEP

    98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVR:dGpmGpUZCby0Wy3V

Malware Config

Targets

    • Target

      0e2c16cdc36d83exe_JC.exe

    • Size

      4.8MB

    • MD5

      0e2c16cdc36d835d88118303bb26e5d3

    • SHA1

      e6b25683dc672caae9852ff2e10556177d332ba6

    • SHA256

      83369bcba7d00547a923021e5015037cbb219980cf77b39477127399d7bdc4c7

    • SHA512

      17635edb162a648dbc3fbae05b9ae0c74071c3b98436b05737969ee57899fac286b725dbb914ddc5b54184fbc2b190fa36b1923ccba999bc4334b46da8a41cce

    • SSDEEP

      98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVR:dGpmGpUZCby0Wy3V

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks