General

  • Target

    9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef

  • Size

    432KB

  • Sample

    240908-e2qtkaweqp

  • MD5

    19287f6438e2da58aed6c5d3ab322d18

  • SHA1

    165529aff8f97b55ec1f5d411bac38f8d0f5ae6d

  • SHA256

    9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef

  • SHA512

    97ab6b01764f2339f01d6de5a29014c76a35d9a4b9d3c1a94aa7431aaf9fea3b83458349223961759a0f1b2e33bc5102d712c0ca6098ecbedc5979a5ff502dcf

  • SSDEEP

    12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQV:B+JHVyR6xXky0KASbcdh6yvQV

Malware Config

Targets

    • Target

      9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef

    • Size

      432KB

    • MD5

      19287f6438e2da58aed6c5d3ab322d18

    • SHA1

      165529aff8f97b55ec1f5d411bac38f8d0f5ae6d

    • SHA256

      9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef

    • SHA512

      97ab6b01764f2339f01d6de5a29014c76a35d9a4b9d3c1a94aa7431aaf9fea3b83458349223961759a0f1b2e33bc5102d712c0ca6098ecbedc5979a5ff502dcf

    • SSDEEP

      12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQV:B+JHVyR6xXky0KASbcdh6yvQV

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks