General
-
Target
36a328a8595e9c7d6402435e72d2a272.bin
-
Size
1.3MB
-
Sample
230725-bpqq9aad5v
-
MD5
1c5fa7718aae8d4f9e7e1837eaa465ce
-
SHA1
d0f2f71995f04641c8373490b4611adb35674cfe
-
SHA256
b6391cfc1c311f356a5fc66ee3cf1ce8a1afd9c1378fb5673e55a6d1b78b8e9a
-
SHA512
080ac9ed0f66dd75a937564cc5c2f864066e97a2a423f463748b34b52665d16314784690a9101281d6e01b001f7abb5a617951aaa88e8125d18cbc3aa00e7ce7
-
SSDEEP
24576:+ZbyT9cQF5mF+h5ALeSGmsXTx41hUVuZ+w+TWQakl1rJBxQEG:+I2QLmYhKexm2l4riSRK1TxpG
Behavioral task
behavioral1
Sample
3e3ed5105170c4ad223592f279b55eefa5a991a911435df33f833218864026c7.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
3e3ed5105170c4ad223592f279b55eefa5a991a911435df33f833218864026c7.bin
-
Size
2.8MB
-
MD5
36a328a8595e9c7d6402435e72d2a272
-
SHA1
8a2f7128e24d537cb239c0e90330eaec384484c7
-
SHA256
3e3ed5105170c4ad223592f279b55eefa5a991a911435df33f833218864026c7
-
SHA512
b7282e047bbe312e43c3f566ea8d457d2d98b0d7bfc7483768f2e8cc2cf4580e75716820577513767957986ef821768c543ed1a41dcfc073123e2f67f939f3de
-
SSDEEP
49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqmj2D:ysnUm8U/6YR36dj2D
-
Detect Blackmoon payload
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2