General

  • Target

    e3f3d6af5bce9ed41a9f6073081369bb719dd1c19adb2e007ffe3438bcc2d457

  • Size

    3.5MB

  • Sample

    230830-w9xqhshg84

  • MD5

    97a606a939383b3a0be6253581e28a7a

  • SHA1

    14906dcf35356c458b79ffde35eb4c8691447751

  • SHA256

    e3f3d6af5bce9ed41a9f6073081369bb719dd1c19adb2e007ffe3438bcc2d457

  • SHA512

    66707858215bb41866aee9a0a0634303d6d3fce1d37ca56e21063aca38aad5e145454e2405c24a7a58501196fedcf56167d3127b3c2b4aa3672296262bd752a0

  • SSDEEP

    24576:TNIPd/zHfWWrwPC6zwPFEc4GdDrGnrdEROGHOhABoaQW8O0C/hRJHOhYa6EZ76d1:TNIlXFEedDqnroHO8wOZHOzH51IGgik

Malware Config

Targets

    • Target

      e3f3d6af5bce9ed41a9f6073081369bb719dd1c19adb2e007ffe3438bcc2d457

    • Size

      3.5MB

    • MD5

      97a606a939383b3a0be6253581e28a7a

    • SHA1

      14906dcf35356c458b79ffde35eb4c8691447751

    • SHA256

      e3f3d6af5bce9ed41a9f6073081369bb719dd1c19adb2e007ffe3438bcc2d457

    • SHA512

      66707858215bb41866aee9a0a0634303d6d3fce1d37ca56e21063aca38aad5e145454e2405c24a7a58501196fedcf56167d3127b3c2b4aa3672296262bd752a0

    • SSDEEP

      24576:TNIPd/zHfWWrwPC6zwPFEc4GdDrGnrdEROGHOhABoaQW8O0C/hRJHOhYa6EZ76d1:TNIlXFEedDqnroHO8wOZHOzH51IGgik

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks