General
-
Target
DKCat.exe
-
Size
17.2MB
-
Sample
230720-ngxaaagb98
-
MD5
7192bbfd6821694aef377cf7d21846f6
-
SHA1
470f520859048e63cfde70206e47266e2d9f5aeb
-
SHA256
ef7520c0e507c804fc5dd365395d118c342bda99efbea0b9a9988847c22e3476
-
SHA512
c4d85f99671094e866f83c465cc2fc1923d6cd7fa1962f3431471a8cf1ce13cbb51886ae0b7b7320c4e2fae77da29586d076ae8e32b59d3167b5ee4cdb1bc511
-
SSDEEP
393216:o+XjgI884sQiasvvLNOmYg3r3d51AyzmkiFmRuEj:o+XjS8XhasvvLNfpbN5aYgsgA
Behavioral task
behavioral1
Sample
DKCat.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
DKCat.exe
-
Size
17.2MB
-
MD5
7192bbfd6821694aef377cf7d21846f6
-
SHA1
470f520859048e63cfde70206e47266e2d9f5aeb
-
SHA256
ef7520c0e507c804fc5dd365395d118c342bda99efbea0b9a9988847c22e3476
-
SHA512
c4d85f99671094e866f83c465cc2fc1923d6cd7fa1962f3431471a8cf1ce13cbb51886ae0b7b7320c4e2fae77da29586d076ae8e32b59d3167b5ee4cdb1bc511
-
SSDEEP
393216:o+XjgI884sQiasvvLNOmYg3r3d51AyzmkiFmRuEj:o+XjS8XhasvvLNfpbN5aYgsgA
-
Detect Blackmoon payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-