General

  • Target

    4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22

  • Size

    8.9MB

  • Sample

    240908-s9blhavajl

  • MD5

    44159a48df832e9a12636f37044b29ea

  • SHA1

    a5c43861ad91a35e71cb0ab748384b092fe4f841

  • SHA256

    4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22

  • SHA512

    4896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56

  • SSDEEP

    196608:8HygLd6jkPHSwzSnuUxxpiS0My1WeeNSvJgePF4yM/CdVcVhF5:NWUerWZt0Myph20+

Malware Config

Targets

    • Target

      4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22

    • Size

      8.9MB

    • MD5

      44159a48df832e9a12636f37044b29ea

    • SHA1

      a5c43861ad91a35e71cb0ab748384b092fe4f841

    • SHA256

      4e15413ea3ec6fda20d2b6f37a28401ea16929772ad59310ddaa4ea5cb220b22

    • SHA512

      4896d86350f36863967277530a837956482b046a2fd7b5ec456a0886424e2268f0414f20e9d7ecd285f4f6ec3d04c39aaffc10a4e722a31100aad1aff1beee56

    • SSDEEP

      196608:8HygLd6jkPHSwzSnuUxxpiS0My1WeeNSvJgePF4yM/CdVcVhF5:NWUerWZt0Myph20+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks