General

  • Target

    c9141b8f5919f46e6be64ddabf35d336be8cba90a1aec9615e927fca88342e0dN.exe

  • Size

    2.0MB

  • Sample

    241220-ec4n5azkal

  • MD5

    ddcd2d88b84a4da72dd0cb3d41d73980

  • SHA1

    3bb4de809de9d08e317d117aca7b9d6b7583c6e2

  • SHA256

    c9141b8f5919f46e6be64ddabf35d336be8cba90a1aec9615e927fca88342e0d

  • SHA512

    7a3b13fc34fab1a0edb467c18018cedaa16b553b8e1e97b523107ae50ac5ed9952ec07c3488ed96ccfd449307a3c61c29347b7482425b8c5c7988abdd794e301

  • SSDEEP

    24576:nSH25PwcN2jx23LdZNtWFKVSIdaY5VFt1LuqJhDqGFeyUQPurCD8JYjSK5ECb:nlDoOTNtGK8IvfuRVy/Pur2Mgb

Malware Config

Targets

    • Target

      c9141b8f5919f46e6be64ddabf35d336be8cba90a1aec9615e927fca88342e0dN.exe

    • Size

      2.0MB

    • MD5

      ddcd2d88b84a4da72dd0cb3d41d73980

    • SHA1

      3bb4de809de9d08e317d117aca7b9d6b7583c6e2

    • SHA256

      c9141b8f5919f46e6be64ddabf35d336be8cba90a1aec9615e927fca88342e0d

    • SHA512

      7a3b13fc34fab1a0edb467c18018cedaa16b553b8e1e97b523107ae50ac5ed9952ec07c3488ed96ccfd449307a3c61c29347b7482425b8c5c7988abdd794e301

    • SSDEEP

      24576:nSH25PwcN2jx23LdZNtWFKVSIdaY5VFt1LuqJhDqGFeyUQPurCD8JYjSK5ECb:nlDoOTNtGK8IvfuRVy/Pur2Mgb

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks