General

  • Target

    4f37979faa2fa89dea4c7009a3854ed0f967c556080f7560a7a8738ffe7a0af8

  • Size

    824KB

  • Sample

    240308-13fwmshg7z

  • MD5

    0c1c4153934ed1b3ac58618ec8daccdd

  • SHA1

    0cd094ad1e89949d23d2dadedda57cb4378fbd23

  • SHA256

    4f37979faa2fa89dea4c7009a3854ed0f967c556080f7560a7a8738ffe7a0af8

  • SHA512

    9b0262f4175097587dd49d70fd52d2e77936e8669f71a4eff0314788db054c57219c1c850fa7dbaf6f89e267fca21c50e869752c4eb0c910174acdf746946f75

  • SSDEEP

    6144:kYqqWRJVo7eGQGGN3YXaafgLMUxVBEXCAI:kYqqWRJVoSGQGGOaaYL7B/

Malware Config

Targets

    • Target

      4f37979faa2fa89dea4c7009a3854ed0f967c556080f7560a7a8738ffe7a0af8

    • Size

      824KB

    • MD5

      0c1c4153934ed1b3ac58618ec8daccdd

    • SHA1

      0cd094ad1e89949d23d2dadedda57cb4378fbd23

    • SHA256

      4f37979faa2fa89dea4c7009a3854ed0f967c556080f7560a7a8738ffe7a0af8

    • SHA512

      9b0262f4175097587dd49d70fd52d2e77936e8669f71a4eff0314788db054c57219c1c850fa7dbaf6f89e267fca21c50e869752c4eb0c910174acdf746946f75

    • SSDEEP

      6144:kYqqWRJVo7eGQGGN3YXaafgLMUxVBEXCAI:kYqqWRJVoSGQGGOaaYL7B/

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks