General

  • Target

    5de4ef011435e8eded20efea932d950c88482791c76b4ae1ea8a181eb87667ed

  • Size

    8.2MB

  • Sample

    240831-1sx26sxepe

  • MD5

    a24fd228fe3ba2e3f7ebeb122eb74a96

  • SHA1

    6dff48c6d8b85ed956ae6ef193928d6ab3e9753f

  • SHA256

    5de4ef011435e8eded20efea932d950c88482791c76b4ae1ea8a181eb87667ed

  • SHA512

    d34a68645cd1d3c997cec8ce1a587a739594537e05bd95e1f7bf44b228d1b5c929a91d28a5efec640f4082b8c3b7947cfd597f34d26b9b27061587ed284753df

  • SSDEEP

    98304:TRoeO6XTBJYazImknGzZr+HIPFtmOZ9G17xwFB5URUSKnaSOdroSCa:NoeO6XTYxmknGzwHIPHd9swFBubKT

Malware Config

Targets

    • Target

      5de4ef011435e8eded20efea932d950c88482791c76b4ae1ea8a181eb87667ed

    • Size

      8.2MB

    • MD5

      a24fd228fe3ba2e3f7ebeb122eb74a96

    • SHA1

      6dff48c6d8b85ed956ae6ef193928d6ab3e9753f

    • SHA256

      5de4ef011435e8eded20efea932d950c88482791c76b4ae1ea8a181eb87667ed

    • SHA512

      d34a68645cd1d3c997cec8ce1a587a739594537e05bd95e1f7bf44b228d1b5c929a91d28a5efec640f4082b8c3b7947cfd597f34d26b9b27061587ed284753df

    • SSDEEP

      98304:TRoeO6XTBJYazImknGzZr+HIPFtmOZ9G17xwFB5URUSKnaSOdroSCa:NoeO6XTYxmknGzwHIPHd9swFBubKT

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (65596) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • OS Credential Dumping: LSASS Memory

      Malicious access to Credentials History.

    • XMRig Miner payload

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks