General

  • Target

    NA_NA_35c840955f4be7exeexe_JC.exe

  • Size

    2.2MB

  • Sample

    230723-y7fekaha9z

  • MD5

    35c840955f4be789ddc0e252974171ef

  • SHA1

    c96bb00118c2a129bae0da4696e8f31b028e4a43

  • SHA256

    c3c053e4997390d69fbbc2b81b1452b717bfbe23d27df456b79ac63b04d9527e

  • SHA512

    5bf7df799ca903f7a97725c0644533f74d33df42aa8e629fc0a165eb66d27dc1a787cc72fbab3b9f5dfaea6db2a1137d799093a4de8adabe600f34fbc3183da2

  • SSDEEP

    49152:9bYwI4iheW4SkZP4sz9Mb5eW4SkZP4sz9MbQ:yei1fkZcNfkZcQ

Malware Config

Targets

    • Target

      NA_NA_35c840955f4be7exeexe_JC.exe

    • Size

      2.2MB

    • MD5

      35c840955f4be789ddc0e252974171ef

    • SHA1

      c96bb00118c2a129bae0da4696e8f31b028e4a43

    • SHA256

      c3c053e4997390d69fbbc2b81b1452b717bfbe23d27df456b79ac63b04d9527e

    • SHA512

      5bf7df799ca903f7a97725c0644533f74d33df42aa8e629fc0a165eb66d27dc1a787cc72fbab3b9f5dfaea6db2a1137d799093a4de8adabe600f34fbc3183da2

    • SSDEEP

      49152:9bYwI4iheW4SkZP4sz9Mb5eW4SkZP4sz9MbQ:yei1fkZcNfkZcQ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks