General

  • Target

    35c840955f4be789ddc0e252974171ef.bin

  • Size

    983KB

  • Sample

    230725-bldmhsad3y

  • MD5

    d8a46a44826ce335fae51b1a46fe1c12

  • SHA1

    8545d3cb98e5970163fe39ee418663774409173e

  • SHA256

    db2526b1c2a6e11e173d0669b45a1dde23907f5ac4c4d075900ba9a060b9b319

  • SHA512

    b30618a3c76bb8b38e204e5953fd550e10ebfdcde16bc66e00b888d783ec699684d56fb7a51c483a2732e42d66ba49f493bd1bcfce2a985f2d6ea08634d5ea06

  • SSDEEP

    24576:BtLfkJaz0werOnj9Yz4v1S6YzfkX60hYdmatRXncnrgKa65fQI:7fo04rOnqzmX6OY3tRsnrRft

Malware Config

Targets

    • Target

      c3c053e4997390d69fbbc2b81b1452b717bfbe23d27df456b79ac63b04d9527e.bin

    • Size

      2.2MB

    • MD5

      35c840955f4be789ddc0e252974171ef

    • SHA1

      c96bb00118c2a129bae0da4696e8f31b028e4a43

    • SHA256

      c3c053e4997390d69fbbc2b81b1452b717bfbe23d27df456b79ac63b04d9527e

    • SHA512

      5bf7df799ca903f7a97725c0644533f74d33df42aa8e629fc0a165eb66d27dc1a787cc72fbab3b9f5dfaea6db2a1137d799093a4de8adabe600f34fbc3183da2

    • SSDEEP

      49152:9bYwI4iheW4SkZP4sz9Mb5eW4SkZP4sz9MbQ:yei1fkZcNfkZcQ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks