General

  • Target

    2b09df6d8acf4ad5c4c3b084d8e253e19764f25e53d46b010d76a11615c159dc

  • Size

    3.3MB

  • Sample

    241219-1nx7da1jbt

  • MD5

    33a3ad9c0179311f7650adf221a7532f

  • SHA1

    3f5d0cbcfe891fd9c21c3a068d41c4296f6aa6ef

  • SHA256

    2b09df6d8acf4ad5c4c3b084d8e253e19764f25e53d46b010d76a11615c159dc

  • SHA512

    cdcb27e6a60b6007c68ceb53e69e5c719f802247651651b6773e43cb17758d39ad9c88f6cbeb0f2d885ae952e7357c4f297f016b909c4070ba57d6d3d78d1da3

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9iLqLo:da9+6Y7SOEibgRr4

Malware Config

Targets

    • Target

      2b09df6d8acf4ad5c4c3b084d8e253e19764f25e53d46b010d76a11615c159dc

    • Size

      3.3MB

    • MD5

      33a3ad9c0179311f7650adf221a7532f

    • SHA1

      3f5d0cbcfe891fd9c21c3a068d41c4296f6aa6ef

    • SHA256

      2b09df6d8acf4ad5c4c3b084d8e253e19764f25e53d46b010d76a11615c159dc

    • SHA512

      cdcb27e6a60b6007c68ceb53e69e5c719f802247651651b6773e43cb17758d39ad9c88f6cbeb0f2d885ae952e7357c4f297f016b909c4070ba57d6d3d78d1da3

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9iLqLo:da9+6Y7SOEibgRr4

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks