General

  • Target

    Trojan.MSIL.Poullight.PA.MTB-1d0c2228e4f710999bd97385b1595cd48bc9b79a837a01eff63efb470a1f92baN

  • Size

    3.1MB

  • Sample

    240916-g5bvxssfnh

  • MD5

    3be8fa0b38501cdb368c5cf5a0615880

  • SHA1

    52083abf2794b5f6f8a429ef5bf5fa552896832f

  • SHA256

    1d0c2228e4f710999bd97385b1595cd48bc9b79a837a01eff63efb470a1f92ba

  • SHA512

    4d60b1c7d41f9a03147cf1d81640d9b6cd09078c9a8e1634006f505c95cf81a3f0a2f3f31b6c925fd9c90be6c733cac7a54cadf19b0dd0b63ea2b2d8a78ea5bd

  • SSDEEP

    49152:eFnAp4kyST0QX9i41ZmCq6M+s8KuqGaX0ToIBAUZLYRXcYz7NWu22wS3BNM8:eFw7ySwQX9iC4n0JBAUZLuMYz1BN

Malware Config

Targets

    • Target

      Trojan.MSIL.Poullight.PA.MTB-1d0c2228e4f710999bd97385b1595cd48bc9b79a837a01eff63efb470a1f92baN

    • Size

      3.1MB

    • MD5

      3be8fa0b38501cdb368c5cf5a0615880

    • SHA1

      52083abf2794b5f6f8a429ef5bf5fa552896832f

    • SHA256

      1d0c2228e4f710999bd97385b1595cd48bc9b79a837a01eff63efb470a1f92ba

    • SHA512

      4d60b1c7d41f9a03147cf1d81640d9b6cd09078c9a8e1634006f505c95cf81a3f0a2f3f31b6c925fd9c90be6c733cac7a54cadf19b0dd0b63ea2b2d8a78ea5bd

    • SSDEEP

      49152:eFnAp4kyST0QX9i41ZmCq6M+s8KuqGaX0ToIBAUZLYRXcYz7NWu22wS3BNM8:eFw7ySwQX9iC4n0JBAUZLuMYz1BN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Poullight

      Poullight is an information stealer first seen in March 2020.

    • Poullight Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks