General

  • Target

    6d14c741f412938760c594300e845272648bc0f92a1f69145ee2dcc7d7efcbf3

  • Size

    235KB

  • Sample

    241225-yn9t3awjel

  • MD5

    de6b64eb7470044aebc250931a367747

  • SHA1

    a85ae5ea92e0116153e794412aadf726c260e31c

  • SHA256

    6d14c741f412938760c594300e845272648bc0f92a1f69145ee2dcc7d7efcbf3

  • SHA512

    5b9f50f878fe83363f63a2c0427dbdaf209465723c2a6a86c4b18f1c331cc17a00c33d0796d53ff16c8fb8d090d654a91dd662b702f09cf21cd16cbd35077e11

  • SSDEEP

    6144:vpLgHDEpTdnKUIgAXGHxh9o9eolxYusR6Py99Bq4z6k:5nTKUJA2HxfoMusR6aZq9

Malware Config

Targets

    • Target

      6d14c741f412938760c594300e845272648bc0f92a1f69145ee2dcc7d7efcbf3

    • Size

      235KB

    • MD5

      de6b64eb7470044aebc250931a367747

    • SHA1

      a85ae5ea92e0116153e794412aadf726c260e31c

    • SHA256

      6d14c741f412938760c594300e845272648bc0f92a1f69145ee2dcc7d7efcbf3

    • SHA512

      5b9f50f878fe83363f63a2c0427dbdaf209465723c2a6a86c4b18f1c331cc17a00c33d0796d53ff16c8fb8d090d654a91dd662b702f09cf21cd16cbd35077e11

    • SSDEEP

      6144:vpLgHDEpTdnKUIgAXGHxh9o9eolxYusR6Py99Bq4z6k:5nTKUJA2HxfoMusR6aZq9

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks