General

  • Target

    NA_NA_180e60c95bf038exeexe_JC.exe

  • Size

    4.6MB

  • Sample

    230723-t6w9gaff6v

  • MD5

    180e60c95bf0387e35084dd8015ed18d

  • SHA1

    92f992ac702899daef87d097e88316cff6f5dc9a

  • SHA256

    13cdad84e380176f37359b2d67357508a1367249dd1a801c0e6dbae1a73dbbb0

  • SHA512

    c85f771152a28fd8c0e4bf705b01dee38d29be01160c5628fdb1861b263b04bec28e31a07873d19a9e0bdca102e6af9f9d80750779982e44472927614aad15e4

  • SSDEEP

    49152:9bYwIM/7t0i0FZaUm8cikLrpYqO+Cq99LyHHI+t6O8N+ailEy6dmpzeioK2enVzp:ysnUm8U/6m0oAaldmdmnpip

Malware Config

Targets

    • Target

      NA_NA_180e60c95bf038exeexe_JC.exe

    • Size

      4.6MB

    • MD5

      180e60c95bf0387e35084dd8015ed18d

    • SHA1

      92f992ac702899daef87d097e88316cff6f5dc9a

    • SHA256

      13cdad84e380176f37359b2d67357508a1367249dd1a801c0e6dbae1a73dbbb0

    • SHA512

      c85f771152a28fd8c0e4bf705b01dee38d29be01160c5628fdb1861b263b04bec28e31a07873d19a9e0bdca102e6af9f9d80750779982e44472927614aad15e4

    • SSDEEP

      49152:9bYwIM/7t0i0FZaUm8cikLrpYqO+Cq99LyHHI+t6O8N+ailEy6dmpzeioK2enVzp:ysnUm8U/6m0oAaldmdmnpip

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks