General

  • Target

    88b6522f46ba37bfd5db77c40e4e61328f2c5ed86f3e687d86ea4dc4e42cf18f

  • Size

    14.6MB

  • Sample

    240528-3nreyaac84

  • MD5

    1f6c7c645957715002f1ffbf3b7e6641

  • SHA1

    450ae8aede3be0cf71a3628c0894ecbeb6a7b1eb

  • SHA256

    88b6522f46ba37bfd5db77c40e4e61328f2c5ed86f3e687d86ea4dc4e42cf18f

  • SHA512

    20e613e0d855a1be661b547eeef4f645162827cecf3d8e62a2516c7c028c994220ef202fe1148007cb6c8a72cfb1cb11b73816c1439a5c0ed0f213e7b5c8fce1

  • SSDEEP

    196608:Ln8MWPOVaTyhCTHRcUkswMXLttbR9E+KNqXeptbPqC3A2QT7SNhb6q/s9Lh:D8MWPvi2HRMu3wqu7znZNhb6CE

Malware Config

Targets

    • Target

      88b6522f46ba37bfd5db77c40e4e61328f2c5ed86f3e687d86ea4dc4e42cf18f

    • Size

      14.6MB

    • MD5

      1f6c7c645957715002f1ffbf3b7e6641

    • SHA1

      450ae8aede3be0cf71a3628c0894ecbeb6a7b1eb

    • SHA256

      88b6522f46ba37bfd5db77c40e4e61328f2c5ed86f3e687d86ea4dc4e42cf18f

    • SHA512

      20e613e0d855a1be661b547eeef4f645162827cecf3d8e62a2516c7c028c994220ef202fe1148007cb6c8a72cfb1cb11b73816c1439a5c0ed0f213e7b5c8fce1

    • SSDEEP

      196608:Ln8MWPOVaTyhCTHRcUkswMXLttbR9E+KNqXeptbPqC3A2QT7SNhb6q/s9Lh:D8MWPvi2HRMu3wqu7znZNhb6CE

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks