General

  • Target

    DKCat 7.4.exe

  • Size

    17.4MB

  • Sample

    230720-neex8agb77

  • MD5

    785083ed993ec3db4b98a85fe916cdb7

  • SHA1

    433d00e265e8801fa5143351b3c07366837e3c31

  • SHA256

    9bc28efb860a295f39925e82638ef63246056f325d4bb1476e393c1d938a4a14

  • SHA512

    965edfd6e76be9c048149bbbda03efa7e43db65c9859d018acce6f44457bfde7f0d59cf6020f86036025137c3f2c876bf4fbdbe6d84bd6fc43da6e8fdb5744ce

  • SSDEEP

    393216:8O5N4WLcbsQiasvvLNOmYg3r3d51AyzmkiFAVlELK:8O5N/cohasvvLNfpbN5aYg+zUK

Malware Config

Targets

    • Target

      DKCat 7.4.exe

    • Size

      17.4MB

    • MD5

      785083ed993ec3db4b98a85fe916cdb7

    • SHA1

      433d00e265e8801fa5143351b3c07366837e3c31

    • SHA256

      9bc28efb860a295f39925e82638ef63246056f325d4bb1476e393c1d938a4a14

    • SHA512

      965edfd6e76be9c048149bbbda03efa7e43db65c9859d018acce6f44457bfde7f0d59cf6020f86036025137c3f2c876bf4fbdbe6d84bd6fc43da6e8fdb5744ce

    • SSDEEP

      393216:8O5N4WLcbsQiasvvLNOmYg3r3d51AyzmkiFAVlELK:8O5N/cohasvvLNfpbN5aYg+zUK

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks