General

  • Target

    NA_NA_5ee25df5bb05a7exeexe_JC.exe

  • Size

    7.3MB

  • Sample

    230724-vsbahsfh37

  • MD5

    5ee25df5bb05a7ca6dfe49556fed3ee3

  • SHA1

    491bd92c7cd1e4e2587e81f173c60dd60ca31c73

  • SHA256

    e6fe224b85b9d09e022eecb84c512e4a87a8a20798b07f03a1976b4faee391e3

  • SHA512

    e20099791f54f42e0b6ef2335a3bec0811677936792f880d073114cb6c17aebe34e094432c56a41aa522ae6ff802fe2fac88ecf5e05488709540bef8c9362a11

  • SSDEEP

    98304:ysnUm8U/6ZkB/qoHMdnJE7hAlKnsz2C2PYdhIqHpnq0Ew7:V18U/6BJEul4szEonqtA

Malware Config

Targets

    • Target

      NA_NA_5ee25df5bb05a7exeexe_JC.exe

    • Size

      7.3MB

    • MD5

      5ee25df5bb05a7ca6dfe49556fed3ee3

    • SHA1

      491bd92c7cd1e4e2587e81f173c60dd60ca31c73

    • SHA256

      e6fe224b85b9d09e022eecb84c512e4a87a8a20798b07f03a1976b4faee391e3

    • SHA512

      e20099791f54f42e0b6ef2335a3bec0811677936792f880d073114cb6c17aebe34e094432c56a41aa522ae6ff802fe2fac88ecf5e05488709540bef8c9362a11

    • SSDEEP

      98304:ysnUm8U/6ZkB/qoHMdnJE7hAlKnsz2C2PYdhIqHpnq0Ew7:V18U/6BJEul4szEonqtA

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks