General

  • Target

    NA_NA_NA_NA_9fc04fac1f8daaex_JC.exe

  • Size

    10.2MB

  • Sample

    230726-vtc6hafe7x

  • MD5

    9fc04fac1f8daaa813204f7b69bda54e

  • SHA1

    b193da9a005746960f3416aae02df8b3c4d4163a

  • SHA256

    d18b805ff7b1c8eb7e8014614197ac4ca03adb8c2fc9fc31e004561ab1b2df2c

  • SHA512

    5df06d56e859b7f6e7c619bdfd04833d86e892946a0beff4699da511e7322331eefee7f17c9accb12ea93215e958a689df6e617ecdcadfa3d31bd8df1d0be905

  • SSDEEP

    98304:ysnUm8U/6f0oAaldmdmnpgsnUm8U/6f0oAaldmdmnprrTdZvU:V18U/6cKmd0N18U/6cKmd0dNZ8

Malware Config

Targets

    • Target

      NA_NA_NA_NA_9fc04fac1f8daaex_JC.exe

    • Size

      10.2MB

    • MD5

      9fc04fac1f8daaa813204f7b69bda54e

    • SHA1

      b193da9a005746960f3416aae02df8b3c4d4163a

    • SHA256

      d18b805ff7b1c8eb7e8014614197ac4ca03adb8c2fc9fc31e004561ab1b2df2c

    • SHA512

      5df06d56e859b7f6e7c619bdfd04833d86e892946a0beff4699da511e7322331eefee7f17c9accb12ea93215e958a689df6e617ecdcadfa3d31bd8df1d0be905

    • SSDEEP

      98304:ysnUm8U/6f0oAaldmdmnpgsnUm8U/6f0oAaldmdmnprrTdZvU:V18U/6cKmd0N18U/6cKmd0dNZ8

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks