General

  • Target

    ad7a268395139d617e3f9485611c4b389eeed6fce31aaf64390a0bd7e4fc7c2e.zip

  • Size

    4.3MB

  • Sample

    241215-ejdraavpbp

  • MD5

    f2f416b8c8c01b6dea6c2f75c2c9c290

  • SHA1

    8534ece5f26533220f29a052fe2ca016a116c578

  • SHA256

    ad7a268395139d617e3f9485611c4b389eeed6fce31aaf64390a0bd7e4fc7c2e

  • SHA512

    df6ea4cbc72ac99792b5a2c2bbe6fdb7c0c0d536a26f8c925f0b6e988ffd506c1001c497f1084e5340b70a6a4cd3f4ffc954c42c21e96543526ca21cb03fc65a

  • SSDEEP

    98304:ceFm6xWW+lZNKBtgYIH2it67s4w2KIF9FlapFTfCrkYLQoyAx:cew6AXqTZIHpcs4w68+kYEfw

Malware Config

Targets

    • Target

      Chrome.exe

    • Size

      4.3MB

    • MD5

      89385817787b65c1e1efa58c8824c1fa

    • SHA1

      e6c72a0f4465c4ebf1b2f27e5b2290e463e3396b

    • SHA256

      0a1c860bd4e521605f256224accd99781d8ef4c06bbf8d5c60fd94c360c36930

    • SHA512

      6eb258fe9bb111e4fe11265fef2b353bb5cee657ab3f8f6798470c828d437912f91d732d0569cf905bffcba5a4a6014aac718264be92c992d27f1d681b75fb36

    • SSDEEP

      98304:/gwRK81kSwPZbAT/B5IXDMLmPG4csKk3hltRJxMxCjQdLGgOxV:/gP8atSDXIXIOG4cGnzQd6f/

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatalrat family

    • Fatal Rat payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks