General

  • Target

    098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59

  • Size

    7.2MB

  • Sample

    240522-sv716afg95

  • MD5

    643921cac760b978cad19942c52976ce

  • SHA1

    43f5a6f4716b9a00177c0deb9aaed2be12ca8283

  • SHA256

    098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59

  • SHA512

    c12336685d997d31eb9912506b0951c8ea38e9fa679ed6c27a549f747eed4a1fcc2d84c31c395128398769a69858096e3474a70e06f05e308fe826921f550cd1

  • SSDEEP

    196608:8Rv44PE6K4+auUPFFPAaDbhkEaXtcg6UuYl3mKCr:CPw4J9lv2fttPl+r

Malware Config

Targets

    • Target

      098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59

    • Size

      7.2MB

    • MD5

      643921cac760b978cad19942c52976ce

    • SHA1

      43f5a6f4716b9a00177c0deb9aaed2be12ca8283

    • SHA256

      098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59

    • SHA512

      c12336685d997d31eb9912506b0951c8ea38e9fa679ed6c27a549f747eed4a1fcc2d84c31c395128398769a69858096e3474a70e06f05e308fe826921f550cd1

    • SSDEEP

      196608:8Rv44PE6K4+auUPFFPAaDbhkEaXtcg6UuYl3mKCr:CPw4J9lv2fttPl+r

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks