General

  • Target

    NA_NA_NA_NA_a5af4c08f79b35ex_JC.exe

  • Size

    2.6MB

  • Sample

    230727-sj5rnaff64

  • MD5

    a5af4c08f79b35c34ceee5805528000a

  • SHA1

    002a2d254be4452a52306311a3a89f4e6e8b6c9e

  • SHA256

    7b17c406dfd8a47249652d11c966c0e14fafefb7f4bf330e28ab14511f21d71f

  • SHA512

    2e566aa1b9d30a7a7a171c7636a60bd9467c96c8418fe7f961c8cb351619fa10d6c949866312f30a342e5b92c677ff200acfd458895ae9f400fa4c38b598744c

  • SSDEEP

    49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqZ:ysnUm8U/6YR36+

Malware Config

Targets

    • Target

      NA_NA_NA_NA_a5af4c08f79b35ex_JC.exe

    • Size

      2.6MB

    • MD5

      a5af4c08f79b35c34ceee5805528000a

    • SHA1

      002a2d254be4452a52306311a3a89f4e6e8b6c9e

    • SHA256

      7b17c406dfd8a47249652d11c966c0e14fafefb7f4bf330e28ab14511f21d71f

    • SHA512

      2e566aa1b9d30a7a7a171c7636a60bd9467c96c8418fe7f961c8cb351619fa10d6c949866312f30a342e5b92c677ff200acfd458895ae9f400fa4c38b598744c

    • SSDEEP

      49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqZ:ysnUm8U/6YR36+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks