Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 15:41

General

  • Target

    e88e981dfbc627746329d579527c938283ce447bea845d735dcad6f149ba794a.exe

  • Size

    694KB

  • MD5

    054e358b91dfdc7f9c588f8c71b6b8f8

  • SHA1

    7e3561803db4e73b2137e5accb29c0379b44533c

  • SHA256

    e88e981dfbc627746329d579527c938283ce447bea845d735dcad6f149ba794a

  • SHA512

    32bbf13dfbcfdbd3b82c67269ce777b3ea0b24be6b450846863c2ca34b6442a90a33d9dc76e674e11b91f8737cad242d77f29348fd3449c03763a56afb4a2284

  • SSDEEP

    12288:3WAPnyPIaZuxwJ4ztWN7OfrEEiSsRVQ5kldJWs8s99+sFphEsqdhoS:3WgyPLfFQkROqlfWW9+sRfq

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88e981dfbc627746329d579527c938283ce447bea845d735dcad6f149ba794a.exe
    "C:\Users\Admin\AppData\Local\Temp\e88e981dfbc627746329d579527c938283ce447bea845d735dcad6f149ba794a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-0-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1084-1-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB