General

  • Target

    b141ab85d517a27d05b3062622ee40da3de8af75c699e44e3f34c54a9257ae77

  • Size

    2.3MB

  • Sample

    240926-lvz7zstbnc

  • MD5

    53cd9e22e24a5f04b676d03c4354ecaa

  • SHA1

    a6bf13724a2de2b7c6a79f5574370daec2fff6a4

  • SHA256

    b141ab85d517a27d05b3062622ee40da3de8af75c699e44e3f34c54a9257ae77

  • SHA512

    8d44a18521b6f09c14a56496e8d68864a7a278e3cab4dae717ca3a74c9e0de8c7c2a4b98e1cbcab88c9b8e98333af396bbd03247b42ef6d440e12173f16a1b7a

  • SSDEEP

    49152:dDUPp6v4xTkL/xfJJvHSVYdCdme3gEAFQKzRP:dDJiKCdmeQEcQKd

Malware Config

Targets

    • Target

      b141ab85d517a27d05b3062622ee40da3de8af75c699e44e3f34c54a9257ae77

    • Size

      2.3MB

    • MD5

      53cd9e22e24a5f04b676d03c4354ecaa

    • SHA1

      a6bf13724a2de2b7c6a79f5574370daec2fff6a4

    • SHA256

      b141ab85d517a27d05b3062622ee40da3de8af75c699e44e3f34c54a9257ae77

    • SHA512

      8d44a18521b6f09c14a56496e8d68864a7a278e3cab4dae717ca3a74c9e0de8c7c2a4b98e1cbcab88c9b8e98333af396bbd03247b42ef6d440e12173f16a1b7a

    • SSDEEP

      49152:dDUPp6v4xTkL/xfJJvHSVYdCdme3gEAFQKzRP:dDJiKCdmeQEcQKd

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks