General

  • Target

    c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289.msi.vir

  • Size

    51.3MB

  • Sample

    241122-d93yeszlhr

  • MD5

    7efb253def4f5980c8e7a4c95a96ce09

  • SHA1

    e5f62d1b33eddca20e1b8cde7bf85205c411f058

  • SHA256

    c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289

  • SHA512

    5a3c05754d5d94a1549f7eb4a08a237e39b976c4994db0bb8e10687757d954d7a3cda5ea1ea432c85e5e9b643378b8a6ae15ec2e6ce17a292d8f4cbe70955f4d

  • SSDEEP

    1572864:33j57EzJvxJXNywl4agZ9KsNhucJaV/Z/7h:33jWtv3dbl3bcJarzh

Malware Config

Targets

    • Target

      c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289.msi.vir

    • Size

      51.3MB

    • MD5

      7efb253def4f5980c8e7a4c95a96ce09

    • SHA1

      e5f62d1b33eddca20e1b8cde7bf85205c411f058

    • SHA256

      c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289

    • SHA512

      5a3c05754d5d94a1549f7eb4a08a237e39b976c4994db0bb8e10687757d954d7a3cda5ea1ea432c85e5e9b643378b8a6ae15ec2e6ce17a292d8f4cbe70955f4d

    • SSDEEP

      1572864:33j57EzJvxJXNywl4agZ9KsNhucJaV/Z/7h:33jWtv3dbl3bcJarzh

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Drops startup file

    • Adds Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies Windows Firewall

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks