General

  • Target

    3ac9df21dbbfa0393f84867ee92aa74aa4b886de6fc08e4b251e91148dfb673f.exe

  • Size

    9.3MB

  • Sample

    241217-w34v9atqct

  • MD5

    1c73244737b508707c2628b8c9a56786

  • SHA1

    d8e5970bb842fdbd74ab921f218aa9818f4f4063

  • SHA256

    3ac9df21dbbfa0393f84867ee92aa74aa4b886de6fc08e4b251e91148dfb673f

  • SHA512

    129e685cada5bb09774adc9e17c046b3fb9f6fcec10f6e2b5f3572d1105396d512879bb755e317cd49d12f27cdb7a94aa1f27c31e79384be9f359e8c4808d7d6

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DP0:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0c

Malware Config

Targets

    • Target

      3ac9df21dbbfa0393f84867ee92aa74aa4b886de6fc08e4b251e91148dfb673f.exe

    • Size

      9.3MB

    • MD5

      1c73244737b508707c2628b8c9a56786

    • SHA1

      d8e5970bb842fdbd74ab921f218aa9818f4f4063

    • SHA256

      3ac9df21dbbfa0393f84867ee92aa74aa4b886de6fc08e4b251e91148dfb673f

    • SHA512

      129e685cada5bb09774adc9e17c046b3fb9f6fcec10f6e2b5f3572d1105396d512879bb755e317cd49d12f27cdb7a94aa1f27c31e79384be9f359e8c4808d7d6

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DP0:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0c

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks