General

  • Target

    01e2484ea6914e2649ab958a91f16f08e55c577fdd896bae35e439a587793739

  • Size

    7.5MB

  • Sample

    240523-3xpmpsdh5t

  • MD5

    f1a313531d109340f89193d030ee6653

  • SHA1

    9e442617f08f1919f6fff0b8e3d89d64a07d20ff

  • SHA256

    01e2484ea6914e2649ab958a91f16f08e55c577fdd896bae35e439a587793739

  • SHA512

    9e281d18154d35e57df05fa7d78fb32a9ce5ce39bb932d31445e35447284c6550aefce3443abd808427ab0d4de9c01fd915996e76ea4e2b7b46e438cd7ea2f9b

  • SSDEEP

    98304:MvkDaRL4vqs4ec/OCWwM9PSz3k/qtiIHFCGdbqpBEPUgIQz4RK2uvgDC0iSgCLQX:Mvk+tQjGga3COH8Oq1Qz4U1n0kZBdb

Malware Config

Targets

    • Target

      01e2484ea6914e2649ab958a91f16f08e55c577fdd896bae35e439a587793739

    • Size

      7.5MB

    • MD5

      f1a313531d109340f89193d030ee6653

    • SHA1

      9e442617f08f1919f6fff0b8e3d89d64a07d20ff

    • SHA256

      01e2484ea6914e2649ab958a91f16f08e55c577fdd896bae35e439a587793739

    • SHA512

      9e281d18154d35e57df05fa7d78fb32a9ce5ce39bb932d31445e35447284c6550aefce3443abd808427ab0d4de9c01fd915996e76ea4e2b7b46e438cd7ea2f9b

    • SSDEEP

      98304:MvkDaRL4vqs4ec/OCWwM9PSz3k/qtiIHFCGdbqpBEPUgIQz4RK2uvgDC0iSgCLQX:Mvk+tQjGga3COH8Oq1Qz4U1n0kZBdb

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks