Resubmissions

17-08-2024 13:46

240817-q247qsycqh 10

General

  • Target

    73bd26093a5e14d30137a757b1f9c721931eba2d3b8a56362fd615ab1e377b35

  • Size

    431KB

  • Sample

    240817-q247qsycqh

  • MD5

    8234f978b1bd609b08fc8da4e3c5003f

  • SHA1

    5551b2a95490538ef5b88ba03f3e17e4ceba562e

  • SHA256

    73bd26093a5e14d30137a757b1f9c721931eba2d3b8a56362fd615ab1e377b35

  • SHA512

    9ac104d133bb5d4501b82c4b2ed665ec3946add429a2a983a2bcfa1eb861baf2281614bff79ab787c31ada0fe94526ba83ba26123064ebd07ed63b8122832f97

  • SSDEEP

    12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9M:IXivg1VCpZOCqxkOH7TBa

Malware Config

Targets

    • Target

      73bd26093a5e14d30137a757b1f9c721931eba2d3b8a56362fd615ab1e377b35

    • Size

      431KB

    • MD5

      8234f978b1bd609b08fc8da4e3c5003f

    • SHA1

      5551b2a95490538ef5b88ba03f3e17e4ceba562e

    • SHA256

      73bd26093a5e14d30137a757b1f9c721931eba2d3b8a56362fd615ab1e377b35

    • SHA512

      9ac104d133bb5d4501b82c4b2ed665ec3946add429a2a983a2bcfa1eb861baf2281614bff79ab787c31ada0fe94526ba83ba26123064ebd07ed63b8122832f97

    • SSDEEP

      12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9M:IXivg1VCpZOCqxkOH7TBa

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks