General

  • Target

    f38dc2dd55295ef5b6e84a242d1625751f88f062130ac0463514172c394d2215

  • Size

    5.4MB

  • Sample

    241221-ycbg5axphr

  • MD5

    3775435ef83892b5a8622c31694912ee

  • SHA1

    31640bab619212659375207aeb801be34d0a8d0d

  • SHA256

    f38dc2dd55295ef5b6e84a242d1625751f88f062130ac0463514172c394d2215

  • SHA512

    3c995268bcde55f6dc423d2ed775ac2baaa2ea4f951cd2a88e7d0568a188d8e5ae568160b33628cb21e7b2a36a62eaebebf70ce298457f2c4bdd293a29bde70a

  • SSDEEP

    98304:LwUH8r7fE8RtW4UgKye2AMspGg1KNribNkMJrUyulwBlEPMbN/a:LwUH+wYtW4UgozMqbKNOxrUyulwByMbc

Malware Config

Targets

    • Target

      f38dc2dd55295ef5b6e84a242d1625751f88f062130ac0463514172c394d2215

    • Size

      5.4MB

    • MD5

      3775435ef83892b5a8622c31694912ee

    • SHA1

      31640bab619212659375207aeb801be34d0a8d0d

    • SHA256

      f38dc2dd55295ef5b6e84a242d1625751f88f062130ac0463514172c394d2215

    • SHA512

      3c995268bcde55f6dc423d2ed775ac2baaa2ea4f951cd2a88e7d0568a188d8e5ae568160b33628cb21e7b2a36a62eaebebf70ce298457f2c4bdd293a29bde70a

    • SSDEEP

      98304:LwUH8r7fE8RtW4UgKye2AMspGg1KNribNkMJrUyulwBlEPMbN/a:LwUH+wYtW4UgozMqbKNOxrUyulwByMbc

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks