General

  • Target

    NA_NA_NA_NA_ba5008d5230ef3ex_JC.exe

  • Size

    6.8MB

  • Sample

    230727-xa85yagh92

  • MD5

    ba5008d5230ef39f16ec68f48ec59b95

  • SHA1

    c7e7e34f8c9ee46f00806234e36c6506bf07777d

  • SHA256

    f3d912ec4cacddf86b487a0f6b6785256259130519356ef91ab3e461b47bd815

  • SHA512

    af0c23e2d001041f28ec5b344e625ffc4482fa32a3bac2362832d336ae79cf3ce39e57d37affbdd2bba708a77d4ec667405d4d28414635dff9bd7809f1777a85

  • SSDEEP

    49152:9bYwIM/7t0i0FZaUm8cikLrpYqs/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uu:ysnUm8U/6cWQtZ/K0tGOFWVRuLftCTvf

Malware Config

Targets

    • Target

      NA_NA_NA_NA_ba5008d5230ef3ex_JC.exe

    • Size

      6.8MB

    • MD5

      ba5008d5230ef39f16ec68f48ec59b95

    • SHA1

      c7e7e34f8c9ee46f00806234e36c6506bf07777d

    • SHA256

      f3d912ec4cacddf86b487a0f6b6785256259130519356ef91ab3e461b47bd815

    • SHA512

      af0c23e2d001041f28ec5b344e625ffc4482fa32a3bac2362832d336ae79cf3ce39e57d37affbdd2bba708a77d4ec667405d4d28414635dff9bd7809f1777a85

    • SSDEEP

      49152:9bYwIM/7t0i0FZaUm8cikLrpYqs/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uu:ysnUm8U/6cWQtZ/K0tGOFWVRuLftCTvf

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks