General

  • Target

    14a8c18adfb8e1exe_JC.exe

  • Size

    5.5MB

  • Sample

    230714-n3v94sec6w

  • MD5

    14a8c18adfb8e142019ef96222129e09

  • SHA1

    7b2e45969804247e1bfc5665574df445496a5368

  • SHA256

    5f058b15c98a4bd26954cfe38511e6fb561f611f833f71f60d4169616be7beae

  • SHA512

    20ea15ec9c1f83efc7d71738fcdb8241c207757b63b3f47630b3dab382ea66fce2fb9b2eebf8303e6c9916ee132c05a25ffac483308154bddfd08b4c93418abe

  • SSDEEP

    98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVRcKYJN3:dGpmGpUZCby0Wy3Ve3T

Malware Config

Targets

    • Target

      14a8c18adfb8e1exe_JC.exe

    • Size

      5.5MB

    • MD5

      14a8c18adfb8e142019ef96222129e09

    • SHA1

      7b2e45969804247e1bfc5665574df445496a5368

    • SHA256

      5f058b15c98a4bd26954cfe38511e6fb561f611f833f71f60d4169616be7beae

    • SHA512

      20ea15ec9c1f83efc7d71738fcdb8241c207757b63b3f47630b3dab382ea66fce2fb9b2eebf8303e6c9916ee132c05a25ffac483308154bddfd08b4c93418abe

    • SSDEEP

      98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVRcKYJN3:dGpmGpUZCby0Wy3Ve3T

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks