General

  • Target

    92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63

  • Size

    5.0MB

  • Sample

    240523-xvhhqach4x

  • MD5

    d97ff1102e8ba106596d50a100021b9f

  • SHA1

    a9484405b91d2b0e19f845b85516d88e271b5184

  • SHA256

    92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63

  • SHA512

    05d055943264b1bab63127ff90edaa6a0cf7ef69282739d0466df4bd015abcc5531910896a0f93e67aa24689e1af4010dbd5e6b3793039bf0da08a6b77887fff

  • SSDEEP

    98304:D+HVb4W8Qh49un3vR3riSm+NJSBGwd43W9FRq:D+HJ8C49O/RHNJSEDiFw

Malware Config

Targets

    • Target

      92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63

    • Size

      5.0MB

    • MD5

      d97ff1102e8ba106596d50a100021b9f

    • SHA1

      a9484405b91d2b0e19f845b85516d88e271b5184

    • SHA256

      92cccc47a5dab5fde39c9ce89b006808e88f4ab664a8f78014f8422639111b63

    • SHA512

      05d055943264b1bab63127ff90edaa6a0cf7ef69282739d0466df4bd015abcc5531910896a0f93e67aa24689e1af4010dbd5e6b3793039bf0da08a6b77887fff

    • SSDEEP

      98304:D+HVb4W8Qh49un3vR3riSm+NJSBGwd43W9FRq:D+HJ8C49O/RHNJSEDiFw

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks