General

  • Target

    3fe059d484294d3c02f3eb7b584fb206

  • Size

    501KB

  • Sample

    240104-exaxjsbbb9

  • MD5

    3fe059d484294d3c02f3eb7b584fb206

  • SHA1

    24897e63701dbd7a0755d4e82d4972a54152c3d0

  • SHA256

    310e81736f134dfa969f4964bd380d60b710695b8e24b174f907d98b57cac4dd

  • SHA512

    d2ed9c5ccdebfe2f759125cb0400bcc73b08facbd797c6bc13dc6a41676e9201f7fbf77690cbb4d021f16e1a96b9e6b6a79d8776b16c59cef513387e0581c125

  • SSDEEP

    6144:FelnyUqrd8IudLvfOtd3BAgxatWxphWyrWw:FWyUadkTCd3BAvWDhWyrWw

Malware Config

Targets

    • Target

      3fe059d484294d3c02f3eb7b584fb206

    • Size

      501KB

    • MD5

      3fe059d484294d3c02f3eb7b584fb206

    • SHA1

      24897e63701dbd7a0755d4e82d4972a54152c3d0

    • SHA256

      310e81736f134dfa969f4964bd380d60b710695b8e24b174f907d98b57cac4dd

    • SHA512

      d2ed9c5ccdebfe2f759125cb0400bcc73b08facbd797c6bc13dc6a41676e9201f7fbf77690cbb4d021f16e1a96b9e6b6a79d8776b16c59cef513387e0581c125

    • SSDEEP

      6144:FelnyUqrd8IudLvfOtd3BAgxatWxphWyrWw:FWyUadkTCd3BAvWDhWyrWw

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks