General

  • Target

    0f21339ee50178eaeb1d81a9e58fb5e11489e99c4f43958a0bb26d62d2de06c3

  • Size

    271KB

  • Sample

    241225-msry9sskct

  • MD5

    48dbb23850bef3914dde28ec88e81046

  • SHA1

    043cdc8f01d5028a77793c7faa62a473f23792c4

  • SHA256

    0f21339ee50178eaeb1d81a9e58fb5e11489e99c4f43958a0bb26d62d2de06c3

  • SHA512

    17a2b10d1434e5127c3f13c6dd24d22b967a8271f78e386b827de3bc0be3f922e51ca77de5cc17ae3fc3b022e409cab1f5c549c6b7eabde03b21083d58123bd2

  • SSDEEP

    6144:lWXALnQgAnQiys9q5pP8VKfl3hQTS2vCd8Rc2Cnv817i:YGSnQ/N5J8VKdmTIdDbnve7i

Malware Config

Targets

    • Target

      0f21339ee50178eaeb1d81a9e58fb5e11489e99c4f43958a0bb26d62d2de06c3

    • Size

      271KB

    • MD5

      48dbb23850bef3914dde28ec88e81046

    • SHA1

      043cdc8f01d5028a77793c7faa62a473f23792c4

    • SHA256

      0f21339ee50178eaeb1d81a9e58fb5e11489e99c4f43958a0bb26d62d2de06c3

    • SHA512

      17a2b10d1434e5127c3f13c6dd24d22b967a8271f78e386b827de3bc0be3f922e51ca77de5cc17ae3fc3b022e409cab1f5c549c6b7eabde03b21083d58123bd2

    • SSDEEP

      6144:lWXALnQgAnQiys9q5pP8VKfl3hQTS2vCd8Rc2Cnv817i:YGSnQ/N5J8VKdmTIdDbnve7i

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks