General

  • Target

    d7bd2ba3de80a8c457c9c58bf837f6f389c8b8e8e67b6050c3e5bcb0700b80a8

  • Size

    9.9MB

  • Sample

    241220-wv6pwa1rcq

  • MD5

    b179d566336497bab9953d3f7880339f

  • SHA1

    28e8bef327f0de400e6396940683eb9c550a86de

  • SHA256

    d7bd2ba3de80a8c457c9c58bf837f6f389c8b8e8e67b6050c3e5bcb0700b80a8

  • SHA512

    24d47e2e1fecf76205268b3d3b1faf0f7362603f7f30588de02341a4bfa0dacf7196d7f70106cd89f611ba8a09f1cbf2bda06756f0575768a377f5c5aee514db

  • SSDEEP

    196608:10/mSRYtxyL/iNKxGUGKkCAEHGzEK0dyB5aDb/PlxpZW:iOMYHuuKoUGKYEHmEldyB5aPfpZW

Malware Config

Targets

    • Target

      d7bd2ba3de80a8c457c9c58bf837f6f389c8b8e8e67b6050c3e5bcb0700b80a8

    • Size

      9.9MB

    • MD5

      b179d566336497bab9953d3f7880339f

    • SHA1

      28e8bef327f0de400e6396940683eb9c550a86de

    • SHA256

      d7bd2ba3de80a8c457c9c58bf837f6f389c8b8e8e67b6050c3e5bcb0700b80a8

    • SHA512

      24d47e2e1fecf76205268b3d3b1faf0f7362603f7f30588de02341a4bfa0dacf7196d7f70106cd89f611ba8a09f1cbf2bda06756f0575768a377f5c5aee514db

    • SSDEEP

      196608:10/mSRYtxyL/iNKxGUGKkCAEHGzEK0dyB5aDb/PlxpZW:iOMYHuuKoUGKYEHmEldyB5aPfpZW

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.