General

  • Target

    e1825d34f08e70_JC.exe

  • Size

    4.8MB

  • Sample

    230718-y6fnyadf57

  • MD5

    e1825d34f08e709a47c3ac7171e59587

  • SHA1

    8999338fd1aec0ccde58da1be1e0fa707483951c

  • SHA256

    02abd656187ac2f7a2360a98806f505d2c6d01acd03426113609d54d96bba378

  • SHA512

    c23f604bd284b66a2e9c55a7d92220266363af5fd2bd636017c793c364745ebe835776998c0d10192243b5acdae791993b6db01107c7d8e07883c71d9e70faa5

  • SSDEEP

    98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVRd:dGpmGpUZCby0Wy3Vr

Malware Config

Targets

    • Target

      e1825d34f08e70_JC.exe

    • Size

      4.8MB

    • MD5

      e1825d34f08e709a47c3ac7171e59587

    • SHA1

      8999338fd1aec0ccde58da1be1e0fa707483951c

    • SHA256

      02abd656187ac2f7a2360a98806f505d2c6d01acd03426113609d54d96bba378

    • SHA512

      c23f604bd284b66a2e9c55a7d92220266363af5fd2bd636017c793c364745ebe835776998c0d10192243b5acdae791993b6db01107c7d8e07883c71d9e70faa5

    • SSDEEP

      98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVRd:dGpmGpUZCby0Wy3Vr

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks