General

  • Target

    cf577c89a03f7ef69719e5374b6734bebcf89da75860cb463032d759c4195b11

  • Size

    7.5MB

  • Sample

    240522-sdk53afc33

  • MD5

    5cd854fe386b4773351841df3bc45f4a

  • SHA1

    3f8e17ba2a32c1406b618d2411b0be430027e5ef

  • SHA256

    cf577c89a03f7ef69719e5374b6734bebcf89da75860cb463032d759c4195b11

  • SHA512

    a2046c9d743d447c8ebf8c6cba0d629b2aea1875fcd739643bbc6dac8b1ddab7545a08e258c28d54ae9e82ad62ace313ba0724005154b27537cf3e8e74f872f7

  • SSDEEP

    196608:Mvk+tQMhf61p7i2CXYc/U7az4O31Ya1PZG:dV1yXYSzUu6a1PZG

Malware Config

Targets

    • Target

      cf577c89a03f7ef69719e5374b6734bebcf89da75860cb463032d759c4195b11

    • Size

      7.5MB

    • MD5

      5cd854fe386b4773351841df3bc45f4a

    • SHA1

      3f8e17ba2a32c1406b618d2411b0be430027e5ef

    • SHA256

      cf577c89a03f7ef69719e5374b6734bebcf89da75860cb463032d759c4195b11

    • SHA512

      a2046c9d743d447c8ebf8c6cba0d629b2aea1875fcd739643bbc6dac8b1ddab7545a08e258c28d54ae9e82ad62ace313ba0724005154b27537cf3e8e74f872f7

    • SSDEEP

      196608:Mvk+tQMhf61p7i2CXYc/U7az4O31Ya1PZG:dV1yXYSzUu6a1PZG

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks