General

  • Target

    DKCat 7.7.exe

  • Size

    17.4MB

  • Sample

    230720-ne55eagb83

  • MD5

    e0a0b8edf30dcdfee7590ced1dd6e8b5

  • SHA1

    f4ce8e489cbbff3f625d3976404c16a24ead8c4c

  • SHA256

    93d97957ce5113fbda9dfdb10646e790df4b15f79ef5ff748131e48010f1c52a

  • SHA512

    a077695fa283625f7a76f235b3a06cd630b635a4f62529415de741def39dbd61f7804ebb4251f4841ab149d98014675a56979a3b05d6459a2aac9b670216d1ca

  • SSDEEP

    393216:Bo8bw8WlwxsQiasvvLNOmYg3r3d51AyzmkiF1XZETT:K8bwVwqhasvvLNfpbN5aYgvpUT

Malware Config

Targets

    • Target

      DKCat 7.7.exe

    • Size

      17.4MB

    • MD5

      e0a0b8edf30dcdfee7590ced1dd6e8b5

    • SHA1

      f4ce8e489cbbff3f625d3976404c16a24ead8c4c

    • SHA256

      93d97957ce5113fbda9dfdb10646e790df4b15f79ef5ff748131e48010f1c52a

    • SHA512

      a077695fa283625f7a76f235b3a06cd630b635a4f62529415de741def39dbd61f7804ebb4251f4841ab149d98014675a56979a3b05d6459a2aac9b670216d1ca

    • SSDEEP

      393216:Bo8bw8WlwxsQiasvvLNOmYg3r3d51AyzmkiF1XZETT:K8bwVwqhasvvLNfpbN5aYgvpUT

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks