General

  • Target

    abe8e279be4be85ebd0983c67f5308816e1ab94d015b22ed9b6865e53a96a0ca

  • Size

    7.1MB

  • Sample

    240522-q8jjlsdg7t

  • MD5

    9f04a38309f7b093832de75a36616150

  • SHA1

    8e56816822e859a38e3cb27725c33982e24bc84f

  • SHA256

    abe8e279be4be85ebd0983c67f5308816e1ab94d015b22ed9b6865e53a96a0ca

  • SHA512

    3330489ff2da15ef95a16e4c8cd6655e959c37d6aa1b0d2a351504030126465ca46484f03ed0d940628e17fceb1dfdabdc30acaa410e36f7fd1c45ad54841c11

  • SSDEEP

    196608:8Rv44PnUEXAy8rZbQxE129FX2knR1+oSZ7maSAU2Jj48KT/9:CPUEqZMxM29dRct7HjJ0V9

Malware Config

Targets

    • Target

      abe8e279be4be85ebd0983c67f5308816e1ab94d015b22ed9b6865e53a96a0ca

    • Size

      7.1MB

    • MD5

      9f04a38309f7b093832de75a36616150

    • SHA1

      8e56816822e859a38e3cb27725c33982e24bc84f

    • SHA256

      abe8e279be4be85ebd0983c67f5308816e1ab94d015b22ed9b6865e53a96a0ca

    • SHA512

      3330489ff2da15ef95a16e4c8cd6655e959c37d6aa1b0d2a351504030126465ca46484f03ed0d940628e17fceb1dfdabdc30acaa410e36f7fd1c45ad54841c11

    • SSDEEP

      196608:8Rv44PnUEXAy8rZbQxE129FX2knR1+oSZ7maSAU2Jj48KT/9:CPUEqZMxM29dRct7HjJ0V9

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks