General

  • Target

    e1825d34f08e709a47c3ac7171e59587.bin

  • Size

    2.2MB

  • Sample

    230720-csph2acc82

  • MD5

    428fb4b0f3148cd1172dc129eaf4dd5f

  • SHA1

    2d638a99ba562d1510122f3cbbbc69178b8adc44

  • SHA256

    b97070b44c56e61f1e9be4917d71fe89424c4b71a20f855b26f37091c0483061

  • SHA512

    edbb5e5955717149789c0355120f348bdcf0934cbb79fb38b2508208509d4386dd2588fe9d8bafc3adac4d9b6b6f49cd52ed57c47b1d66571cf89263d68a3d1f

  • SSDEEP

    49152:t2zM0vkbZfK+dpMD4kErVOFrlkiruDpjtg7ssosodNa0IZe7:uhvUZf9Q8kEolFMtg7aJ

Malware Config

Targets

    • Target

      02abd656187ac2f7a2360a98806f505d2c6d01acd03426113609d54d96bba378.bin

    • Size

      4.8MB

    • MD5

      e1825d34f08e709a47c3ac7171e59587

    • SHA1

      8999338fd1aec0ccde58da1be1e0fa707483951c

    • SHA256

      02abd656187ac2f7a2360a98806f505d2c6d01acd03426113609d54d96bba378

    • SHA512

      c23f604bd284b66a2e9c55a7d92220266363af5fd2bd636017c793c364745ebe835776998c0d10192243b5acdae791993b6db01107c7d8e07883c71d9e70faa5

    • SSDEEP

      98304:yOGpfOGpqtRvW4mjcvdsnYtgyFkhWyKawuVRd:dGpmGpUZCby0Wy3Vr

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks