General

  • Target

    a1d101f004cb9f664df7868ce64a2530N

  • Size

    375KB

  • Sample

    240914-at9jgsyanh

  • MD5

    a1d101f004cb9f664df7868ce64a2530

  • SHA1

    2a835710eee2634b0945c90266da38e091fec3f8

  • SHA256

    1d3fa556d01d134b5155cbd1721738d767705828b9986c6a7ed2eec30cdaddfb

  • SHA512

    4e964e53dce6d8d2728426533eee987adb083cd183959784cd3f197184d0845b5bb43dda946988d869b493a97271792b2d62601a08dda8de9ee994451a64b3dd

  • SSDEEP

    6144:n3C9BRIG0asYFm71mJl3/X8mak5gNv9rC8IwLaYNUvtTxTKMMI:n3C9uYA7i3/stR9HGYyvtTxTKMD

Malware Config

Targets

    • Target

      a1d101f004cb9f664df7868ce64a2530N

    • Size

      375KB

    • MD5

      a1d101f004cb9f664df7868ce64a2530

    • SHA1

      2a835710eee2634b0945c90266da38e091fec3f8

    • SHA256

      1d3fa556d01d134b5155cbd1721738d767705828b9986c6a7ed2eec30cdaddfb

    • SHA512

      4e964e53dce6d8d2728426533eee987adb083cd183959784cd3f197184d0845b5bb43dda946988d869b493a97271792b2d62601a08dda8de9ee994451a64b3dd

    • SSDEEP

      6144:n3C9BRIG0asYFm71mJl3/X8mak5gNv9rC8IwLaYNUvtTxTKMMI:n3C9uYA7i3/stR9HGYyvtTxTKMD

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks