General

  • Target

    fec24e21bcd84410c0c7a042578b5314949089b8d86f3d2435fb0862267eec04

  • Size

    7.1MB

  • Sample

    240522-sxxm7sfh5x

  • MD5

    a2b84e2cae06f3b4dedccfe9a01ad22f

  • SHA1

    2825f41cdc0e31efa937f2e6dd842cba28d3b9d4

  • SHA256

    fec24e21bcd84410c0c7a042578b5314949089b8d86f3d2435fb0862267eec04

  • SHA512

    ac4d49d1d0f5c47ddd6668fdcdd0a477cbacba8346e130ae195aa877f7a69d6e5bb2cdf869574529e867b6f053d7752c7a91a0fd4d5b382d5e2761e0dfd29303

  • SSDEEP

    196608:8Rv44PdT/OcCJYsAqCyfQr44dthW+Mbtc8K6WKnroKm5p:CPJG7f4jHQrtlnnw5p

Malware Config

Targets

    • Target

      fec24e21bcd84410c0c7a042578b5314949089b8d86f3d2435fb0862267eec04

    • Size

      7.1MB

    • MD5

      a2b84e2cae06f3b4dedccfe9a01ad22f

    • SHA1

      2825f41cdc0e31efa937f2e6dd842cba28d3b9d4

    • SHA256

      fec24e21bcd84410c0c7a042578b5314949089b8d86f3d2435fb0862267eec04

    • SHA512

      ac4d49d1d0f5c47ddd6668fdcdd0a477cbacba8346e130ae195aa877f7a69d6e5bb2cdf869574529e867b6f053d7752c7a91a0fd4d5b382d5e2761e0dfd29303

    • SSDEEP

      196608:8Rv44PdT/OcCJYsAqCyfQr44dthW+Mbtc8K6WKnroKm5p:CPJG7f4jHQrtlnnw5p

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks