General

  • Target

    f062d26483d0bb0fccc152133cc67b08cbda7f73de187db2de3ca31289da31ab

  • Size

    282KB

  • Sample

    241221-c4txws1kgm

  • MD5

    7221de427bfc94627d5dca358b07653c

  • SHA1

    356b3562884ed9409ebc490db637a80c891b660e

  • SHA256

    f062d26483d0bb0fccc152133cc67b08cbda7f73de187db2de3ca31289da31ab

  • SHA512

    7b75c91ef877f780e8b8bddd0d85ed1992e78502f4633e1d4ec9ef1e9fdcd2751208d2d0b200de841e60b52568f79594759e85dfe317a85486c7f54a035fad5d

  • SSDEEP

    6144:dnriPrgSyrSjda3biWdzvOsoXsYczVgYSyykq3tiMmVVpOfMR+B8ckBtqqXpeYwR:dnQZnda3OWAsPYciuykCtizOhB8ck3q3

Malware Config

Targets

    • Target

      f062d26483d0bb0fccc152133cc67b08cbda7f73de187db2de3ca31289da31ab

    • Size

      282KB

    • MD5

      7221de427bfc94627d5dca358b07653c

    • SHA1

      356b3562884ed9409ebc490db637a80c891b660e

    • SHA256

      f062d26483d0bb0fccc152133cc67b08cbda7f73de187db2de3ca31289da31ab

    • SHA512

      7b75c91ef877f780e8b8bddd0d85ed1992e78502f4633e1d4ec9ef1e9fdcd2751208d2d0b200de841e60b52568f79594759e85dfe317a85486c7f54a035fad5d

    • SSDEEP

      6144:dnriPrgSyrSjda3biWdzvOsoXsYczVgYSyykq3tiMmVVpOfMR+B8ckBtqqXpeYwR:dnQZnda3OWAsPYciuykCtizOhB8ck3q3

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks