General

  • Target

    3399274e0046749cff555e46cf3d33437d235651cd94923e356b0d996cc53549

  • Size

    10.8MB

  • Sample

    241212-ym55gswjay

  • MD5

    7e4bb3245fcd076f30d4a57da5b0ebf7

  • SHA1

    c72a8bd2ac956ee2a950eb165b51fd9bbcbff385

  • SHA256

    3399274e0046749cff555e46cf3d33437d235651cd94923e356b0d996cc53549

  • SHA512

    838242b4c02bf91a06d386d27db96a714692b729102d1a64825a4de62bf1614ff118806b4b39e3dc25d8d150c49fc0a140c2a6073ad7a3cf5794cb3edd2cd04b

  • SSDEEP

    196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

Malware Config

Targets

    • Target

      3399274e0046749cff555e46cf3d33437d235651cd94923e356b0d996cc53549

    • Size

      10.8MB

    • MD5

      7e4bb3245fcd076f30d4a57da5b0ebf7

    • SHA1

      c72a8bd2ac956ee2a950eb165b51fd9bbcbff385

    • SHA256

      3399274e0046749cff555e46cf3d33437d235651cd94923e356b0d996cc53549

    • SHA512

      838242b4c02bf91a06d386d27db96a714692b729102d1a64825a4de62bf1614ff118806b4b39e3dc25d8d150c49fc0a140c2a6073ad7a3cf5794cb3edd2cd04b

    • SSDEEP

      196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks