General

  • Target

    b968d3e0114df07d141407588b765d5a8ee45a45ddfeb009e9b227ffd4dc9912

  • Size

    3.0MB

  • Sample

    241119-m468bszmen

  • MD5

    3ef441b09d3e745fd2f7d28754bed1e8

  • SHA1

    3fb29d3f78b63b640582e5f7a69189bc7485efab

  • SHA256

    b968d3e0114df07d141407588b765d5a8ee45a45ddfeb009e9b227ffd4dc9912

  • SHA512

    af92f959bcba3f4dbe0058f769b86ef5b77b2e3ec60192ac8610133b512792cfd6521152f32bbc3bcfede77a9f444d742e5f65a1ebbe78726d1672025101fa00

  • SSDEEP

    49152:3eaAsvs9gpQrwlMOJdoR5KfYrhAQklXM74svVnomdrUGhUvgCjOwZH6fwQRorRO:3nqCwauR53h6lXMkUnosZhUnjvZH6oQZ

Malware Config

Targets

    • Target

      b968d3e0114df07d141407588b765d5a8ee45a45ddfeb009e9b227ffd4dc9912

    • Size

      3.0MB

    • MD5

      3ef441b09d3e745fd2f7d28754bed1e8

    • SHA1

      3fb29d3f78b63b640582e5f7a69189bc7485efab

    • SHA256

      b968d3e0114df07d141407588b765d5a8ee45a45ddfeb009e9b227ffd4dc9912

    • SHA512

      af92f959bcba3f4dbe0058f769b86ef5b77b2e3ec60192ac8610133b512792cfd6521152f32bbc3bcfede77a9f444d742e5f65a1ebbe78726d1672025101fa00

    • SSDEEP

      49152:3eaAsvs9gpQrwlMOJdoR5KfYrhAQklXM74svVnomdrUGhUvgCjOwZH6fwQRorRO:3nqCwauR53h6lXMkUnosZhUnjvZH6oQZ

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks