General

  • Target

    Line-.exe

  • Size

    111.2MB

  • Sample

    231101-ey79faac9x

  • MD5

    ecb4d3670188b70cd7ffbdebdcb25de8

  • SHA1

    2dab4a0c63f2824eddf54c7df036e4a1bc3081a7

  • SHA256

    6e3416dc9b06a869909a9380db5503992ad20b5c3c8a5a7eb761e3c712928ec5

  • SHA512

    6e0e6fb42204edc8e5ddeb0121e0eaf2382cb8871ea52956016ee62fb4ddecf48b8b929c2839dc9c4d6829f653079b890d82391dc4a8a85d003d8ada813484b6

  • SSDEEP

    3145728:dccerBmdtE+bQab//oYQQYVvsfI2RDhKcGEvFdV:6frQ70a8EYVaIGCEND

Malware Config

Targets

    • Target

      Line-.exe

    • Size

      111.2MB

    • MD5

      ecb4d3670188b70cd7ffbdebdcb25de8

    • SHA1

      2dab4a0c63f2824eddf54c7df036e4a1bc3081a7

    • SHA256

      6e3416dc9b06a869909a9380db5503992ad20b5c3c8a5a7eb761e3c712928ec5

    • SHA512

      6e0e6fb42204edc8e5ddeb0121e0eaf2382cb8871ea52956016ee62fb4ddecf48b8b929c2839dc9c4d6829f653079b890d82391dc4a8a85d003d8ada813484b6

    • SSDEEP

      3145728:dccerBmdtE+bQab//oYQQYVvsfI2RDhKcGEvFdV:6frQ70a8EYVaIGCEND

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks