General

  • Target

    781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b

  • Size

    11.8MB

  • Sample

    241221-eezsyssmfm

  • MD5

    2a50547b0862c3670769f025619058df

  • SHA1

    dc4044527ffe0a2e3e231f9bbe725f4af7960e6f

  • SHA256

    781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b

  • SHA512

    7285260186f2b513bc43178d79f3e6f61f0c5c499db0eff0cb7ee6a0b24da7af076b46f3e0bfb7a6f094d750276b0bbfa77e216896c5e817c6429a03919a2ebf

  • SSDEEP

    196608:Bx0n65dYHadykfgxPFbks7zmELJvBJzzFflbWYzchp8IZTV56srubyohJny1hcGK:g65dLuFb9GELJ5Jzpf4icsIZTPibdGK

Malware Config

Targets

    • Target

      781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b

    • Size

      11.8MB

    • MD5

      2a50547b0862c3670769f025619058df

    • SHA1

      dc4044527ffe0a2e3e231f9bbe725f4af7960e6f

    • SHA256

      781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b

    • SHA512

      7285260186f2b513bc43178d79f3e6f61f0c5c499db0eff0cb7ee6a0b24da7af076b46f3e0bfb7a6f094d750276b0bbfa77e216896c5e817c6429a03919a2ebf

    • SSDEEP

      196608:Bx0n65dYHadykfgxPFbks7zmELJvBJzzFflbWYzchp8IZTV56srubyohJny1hcGK:g65dLuFb9GELJ5Jzpf4icsIZTPibdGK

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • A potential corporate email address has been identified in the URL: png@3x

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks