General

  • Target

    c5b259bcad6846_JC.exe

  • Size

    955KB

  • Sample

    230718-tmnszsca56

  • MD5

    c5b259bcad68460451249aa9ff5d4c59

  • SHA1

    a53ccd534ef8d5c61e807972339fd8cbfd3999cc

  • SHA256

    deae486211d65cf112af12f8481f1cba5330203706e372da16abb6c2d9b859b2

  • SHA512

    f2dc7c4bb295c24be10063521be2956ab44c6f6e0d17f973816eaa537c92a4cf73f620ca176f671a3516e9766cc86d56fc639f2fb3077db0a859a658f3e85178

  • SSDEEP

    24576:9bByA20GK5jcAkSYqyEPa9dsTcQ7IwMpKI:9bYA7pYqi9dsTh7Iwi

Malware Config

Targets

    • Target

      c5b259bcad6846_JC.exe

    • Size

      955KB

    • MD5

      c5b259bcad68460451249aa9ff5d4c59

    • SHA1

      a53ccd534ef8d5c61e807972339fd8cbfd3999cc

    • SHA256

      deae486211d65cf112af12f8481f1cba5330203706e372da16abb6c2d9b859b2

    • SHA512

      f2dc7c4bb295c24be10063521be2956ab44c6f6e0d17f973816eaa537c92a4cf73f620ca176f671a3516e9766cc86d56fc639f2fb3077db0a859a658f3e85178

    • SSDEEP

      24576:9bByA20GK5jcAkSYqyEPa9dsTcQ7IwMpKI:9bYA7pYqi9dsTh7Iwi

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks