General
-
Target
6131f6137485449cb0f06db7c3ab3b63b1c1194996cbe911f819d6e1d592879dN.exe
-
Size
432KB
-
Sample
241124-btevjssrar
-
MD5
2b5b05df13edf4365db93eb3f5825120
-
SHA1
1f9058c9ea15ccd423083d840393f76562ea6bd1
-
SHA256
6131f6137485449cb0f06db7c3ab3b63b1c1194996cbe911f819d6e1d592879d
-
SHA512
e00685b2118540be29fd7d8c74294938a9b42e0e1241101064792d403ec73f302d2ef30ccacc500b058c699822f33b1a3d1d0c0203ec088551920885b980a802
-
SSDEEP
3072:TVmHpJqu0Vh6jw/fmZmRMpVuWwP5tOcQfgdVqYHKjoS1HwZCFjTPG1UFNE2XCKUc:TcHpJfHElepVuWwP5YcQfg8J+ojCKC+N
Malware Config
Targets
-
-
Target
6131f6137485449cb0f06db7c3ab3b63b1c1194996cbe911f819d6e1d592879dN.exe
-
Size
432KB
-
MD5
2b5b05df13edf4365db93eb3f5825120
-
SHA1
1f9058c9ea15ccd423083d840393f76562ea6bd1
-
SHA256
6131f6137485449cb0f06db7c3ab3b63b1c1194996cbe911f819d6e1d592879d
-
SHA512
e00685b2118540be29fd7d8c74294938a9b42e0e1241101064792d403ec73f302d2ef30ccacc500b058c699822f33b1a3d1d0c0203ec088551920885b980a802
-
SSDEEP
3072:TVmHpJqu0Vh6jw/fmZmRMpVuWwP5tOcQfgdVqYHKjoS1HwZCFjTPG1UFNE2XCKUc:TcHpJfHElepVuWwP5YcQfg8J+ojCKC+N
-
Blackmoon family
-
Detect Blackmoon payload
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Deletes itself
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1