General

  • Target

    a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb

  • Size

    3.3MB

  • Sample

    241122-jz1yzaxjht

  • MD5

    9864f180fe6ba36961d20acb9f61ea62

  • SHA1

    dae87fe5dac27c7340be6ee9928720af8c22b9df

  • SHA256

    a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb

  • SHA512

    c053c61035231752a409dffe4da1a9af2b0f8ceb0fcf265be685d7949f5c16f2424704b49a08e8d0e62d2355d1bbacd5fe92ebe7bc4cf894fcd5f8697f8dcac4

  • SSDEEP

    98304:7S5ZkBnLE4okpzJOGESh8v67fPY6bGo1xElDiVZr0TDpP:S+LE4okpzJESOv6zYSGtDiVI

Malware Config

Targets

    • Target

      a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb

    • Size

      3.3MB

    • MD5

      9864f180fe6ba36961d20acb9f61ea62

    • SHA1

      dae87fe5dac27c7340be6ee9928720af8c22b9df

    • SHA256

      a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb

    • SHA512

      c053c61035231752a409dffe4da1a9af2b0f8ceb0fcf265be685d7949f5c16f2424704b49a08e8d0e62d2355d1bbacd5fe92ebe7bc4cf894fcd5f8697f8dcac4

    • SSDEEP

      98304:7S5ZkBnLE4okpzJOGESh8v67fPY6bGo1xElDiVZr0TDpP:S+LE4okpzJESOv6zYSGtDiVI

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks