General
-
Target
c91751899f703b252f9a9e2965c17708c2c250bc04a305b4f1e2edad4fcace33
-
Size
271KB
-
Sample
241225-m5gdasslcy
-
MD5
8003beed2ba3e79ab575886da606f8e1
-
SHA1
6a3d2c7d7c991f6a4013b7fe22d3bdada9ff9ec0
-
SHA256
c91751899f703b252f9a9e2965c17708c2c250bc04a305b4f1e2edad4fcace33
-
SHA512
9d02528ce98751a25c244f8add7468e6d9de9483a8f1b2a017df63945b4c5e7dc8e10522dff91b4cced6eb72e7db0712143ad04b55663fad08a2c90af8a5e682
-
SSDEEP
6144:pWXALnQgAnQiys9q5pP8VKf/i3vjlibbt4RfzZiKg2G817k:MGSnQ/N5J8VKXifO49Zzoi7k
Behavioral task
behavioral1
Sample
c91751899f703b252f9a9e2965c17708c2c250bc04a305b4f1e2edad4fcace33.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c91751899f703b252f9a9e2965c17708c2c250bc04a305b4f1e2edad4fcace33
-
Size
271KB
-
MD5
8003beed2ba3e79ab575886da606f8e1
-
SHA1
6a3d2c7d7c991f6a4013b7fe22d3bdada9ff9ec0
-
SHA256
c91751899f703b252f9a9e2965c17708c2c250bc04a305b4f1e2edad4fcace33
-
SHA512
9d02528ce98751a25c244f8add7468e6d9de9483a8f1b2a017df63945b4c5e7dc8e10522dff91b4cced6eb72e7db0712143ad04b55663fad08a2c90af8a5e682
-
SSDEEP
6144:pWXALnQgAnQiys9q5pP8VKf/i3vjlibbt4RfzZiKg2G817k:MGSnQ/N5J8VKXifO49Zzoi7k
-
Blackmoon family
-
Detect Blackmoon payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3