General

  • Target

    9a0ada1a757cbb8e6fd982ff45c32bbc90cb223c0237c63a8236eea42c7816a4

  • Size

    5.7MB

  • Sample

    241220-ztv4javjek

  • MD5

    edba0477f72a054338d81949605d7a29

  • SHA1

    2918a4571fd29eec985a84a5cc75b4e767b3cd7a

  • SHA256

    9a0ada1a757cbb8e6fd982ff45c32bbc90cb223c0237c63a8236eea42c7816a4

  • SHA512

    22c059fc8943eac86c951cdeb7024fe73c78eb67ca08d8dffb1e83a4ce6dcd8132cb1e77631c7c127ee5244cb1430f3d35ae7cf4097f31c1186d4f59ec8850aa

  • SSDEEP

    98304:CIQUKox9wcSXna773xHf+c9dI6ta680w1KO5dszYE4aJUgFs28lCNs:RxlWna5fPxaiO5ZE1JUv284

Malware Config

Targets

    • Target

      9a0ada1a757cbb8e6fd982ff45c32bbc90cb223c0237c63a8236eea42c7816a4

    • Size

      5.7MB

    • MD5

      edba0477f72a054338d81949605d7a29

    • SHA1

      2918a4571fd29eec985a84a5cc75b4e767b3cd7a

    • SHA256

      9a0ada1a757cbb8e6fd982ff45c32bbc90cb223c0237c63a8236eea42c7816a4

    • SHA512

      22c059fc8943eac86c951cdeb7024fe73c78eb67ca08d8dffb1e83a4ce6dcd8132cb1e77631c7c127ee5244cb1430f3d35ae7cf4097f31c1186d4f59ec8850aa

    • SSDEEP

      98304:CIQUKox9wcSXna773xHf+c9dI6ta680w1KO5dszYE4aJUgFs28lCNs:RxlWna5fPxaiO5ZE1JUv284

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks