General

  • Target

    W-p-s-X.6.4.exe

  • Size

    103.4MB

  • Sample

    230828-eg6z2shc8w

  • MD5

    5fbe99e528572de675c72bfb3102584a

  • SHA1

    0e04c5bb38a47cf0eca9120d7e8637c1114c83b2

  • SHA256

    d90cd579e5d990d15167cb85f288b85cd50af5e1b195ecbb0d9848b7e0abbbaf

  • SHA512

    b8faa21e4d6eacee27a4ca6eff0cbb4ea1dbe2250c7398d757fc7cf60d4d0764490253fc0ee68728e8bdaf0ca59b9bc6e7a48247d4560513e327bdd5e3a0cdfb

  • SSDEEP

    3145728:whd03L6sBGn66jS6ZQJ5r4b9s0rhDbV1MdlKI2JFOhbA:8UDBG66jS6ST101nVckI2DOhbA

Malware Config

Targets

    • Target

      W-p-s-X.6.4.exe

    • Size

      103.4MB

    • MD5

      5fbe99e528572de675c72bfb3102584a

    • SHA1

      0e04c5bb38a47cf0eca9120d7e8637c1114c83b2

    • SHA256

      d90cd579e5d990d15167cb85f288b85cd50af5e1b195ecbb0d9848b7e0abbbaf

    • SHA512

      b8faa21e4d6eacee27a4ca6eff0cbb4ea1dbe2250c7398d757fc7cf60d4d0764490253fc0ee68728e8bdaf0ca59b9bc6e7a48247d4560513e327bdd5e3a0cdfb

    • SSDEEP

      3145728:whd03L6sBGn66jS6ZQJ5r4b9s0rhDbV1MdlKI2JFOhbA:8UDBG66jS6ST101nVckI2DOhbA

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks