General

  • Target

    947897f1318cd1e03417c2e4699ac14c2d8b2e4fd7e51a5044fc2d5f8257e738

  • Size

    153KB

  • Sample

    241227-fc3bqssjav

  • MD5

    0dbc181e2d3c29cff307d69d70df4a80

  • SHA1

    7a7ee57261356957fc9cd66d70771ba0b8609f83

  • SHA256

    947897f1318cd1e03417c2e4699ac14c2d8b2e4fd7e51a5044fc2d5f8257e738

  • SHA512

    cec7c14cb6000620bc31fed4bbc464bd553d091838ddba3b74972ed4f55630aa7d965c822db059bca52c62357e542db521659847892de6c238a4160812ef48e7

  • SSDEEP

    3072:C5VK0lTSG9xoC+CQpiU5M8U3mjfv2JxhGtBx0N4w:d0T9xB+CUamjfvIxhGtB6N

Malware Config

Targets

    • Target

      947897f1318cd1e03417c2e4699ac14c2d8b2e4fd7e51a5044fc2d5f8257e738

    • Size

      153KB

    • MD5

      0dbc181e2d3c29cff307d69d70df4a80

    • SHA1

      7a7ee57261356957fc9cd66d70771ba0b8609f83

    • SHA256

      947897f1318cd1e03417c2e4699ac14c2d8b2e4fd7e51a5044fc2d5f8257e738

    • SHA512

      cec7c14cb6000620bc31fed4bbc464bd553d091838ddba3b74972ed4f55630aa7d965c822db059bca52c62357e542db521659847892de6c238a4160812ef48e7

    • SSDEEP

      3072:C5VK0lTSG9xoC+CQpiU5M8U3mjfv2JxhGtBx0N4w:d0T9xB+CUamjfvIxhGtB6N

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks