General

  • Target

    36a328a8595e9c7d6402435e72d2a272.bin

  • Size

    1.3MB

  • Sample

    230725-bpqq9aad5v

  • MD5

    1c5fa7718aae8d4f9e7e1837eaa465ce

  • SHA1

    d0f2f71995f04641c8373490b4611adb35674cfe

  • SHA256

    b6391cfc1c311f356a5fc66ee3cf1ce8a1afd9c1378fb5673e55a6d1b78b8e9a

  • SHA512

    080ac9ed0f66dd75a937564cc5c2f864066e97a2a423f463748b34b52665d16314784690a9101281d6e01b001f7abb5a617951aaa88e8125d18cbc3aa00e7ce7

  • SSDEEP

    24576:+ZbyT9cQF5mF+h5ALeSGmsXTx41hUVuZ+w+TWQakl1rJBxQEG:+I2QLmYhKexm2l4riSRK1TxpG

Malware Config

Targets

    • Target

      3e3ed5105170c4ad223592f279b55eefa5a991a911435df33f833218864026c7.bin

    • Size

      2.8MB

    • MD5

      36a328a8595e9c7d6402435e72d2a272

    • SHA1

      8a2f7128e24d537cb239c0e90330eaec384484c7

    • SHA256

      3e3ed5105170c4ad223592f279b55eefa5a991a911435df33f833218864026c7

    • SHA512

      b7282e047bbe312e43c3f566ea8d457d2d98b0d7bfc7483768f2e8cc2cf4580e75716820577513767957986ef821768c543ed1a41dcfc073123e2f67f939f3de

    • SSDEEP

      49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqmj2D:ysnUm8U/6YR36dj2D

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks