General

  • Target

    9ebacf2ee8a74162cde9f1825e61fe144260bb2ff2d15ca9b4507e8bb7de37a0

  • Size

    432KB

  • Sample

    240908-zpp2qaxdkc

  • MD5

    d8379704872eac74fef9d425b108b31c

  • SHA1

    7ed1d867ee1cfa55bf583676cd8bd79801018fb1

  • SHA256

    9ebacf2ee8a74162cde9f1825e61fe144260bb2ff2d15ca9b4507e8bb7de37a0

  • SHA512

    f8ab474ba39fd5f5eaa39a073dad76c4f5b9b2e5a28d91683c5dc9d2ab0bd6aa9c6c3d121aed2749847abcea7ca320717b52e1cde36ff1b837541d9d5ea7979c

  • SSDEEP

    12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQS:B+JHVyR6xXky0KASbcdh6yvQS

Malware Config

Targets

    • Target

      9ebacf2ee8a74162cde9f1825e61fe144260bb2ff2d15ca9b4507e8bb7de37a0

    • Size

      432KB

    • MD5

      d8379704872eac74fef9d425b108b31c

    • SHA1

      7ed1d867ee1cfa55bf583676cd8bd79801018fb1

    • SHA256

      9ebacf2ee8a74162cde9f1825e61fe144260bb2ff2d15ca9b4507e8bb7de37a0

    • SHA512

      f8ab474ba39fd5f5eaa39a073dad76c4f5b9b2e5a28d91683c5dc9d2ab0bd6aa9c6c3d121aed2749847abcea7ca320717b52e1cde36ff1b837541d9d5ea7979c

    • SSDEEP

      12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQS:B+JHVyR6xXky0KASbcdh6yvQS

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks