General

  • Target

    46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe

  • Size

    15.7MB

  • Sample

    250201-dqkyhatlhn

  • MD5

    69b41cf98c265e6dcc00161fd0f300c0

  • SHA1

    62a9fa9eda1f95cbcd14b7fee4c2f7213d6d1f7b

  • SHA256

    46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48

  • SHA512

    0caee441fdc2835fd732780fbf2a6a11101e025d140b14c7f794d7f3e99b1c33f74916b05d49468d64bf06c312b651f2829cff560690f484de315a5dab9bef21

  • SSDEEP

    196608:da9+6Y7SOEibgRrwo8NUu7gh1a9+6Y7SOEibgRrwo8NUu7ghvyHFkr23LO:dFgRrwo8N41FgRrwo8N4vyC

Malware Config

Targets

    • Target

      46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe

    • Size

      15.7MB

    • MD5

      69b41cf98c265e6dcc00161fd0f300c0

    • SHA1

      62a9fa9eda1f95cbcd14b7fee4c2f7213d6d1f7b

    • SHA256

      46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48

    • SHA512

      0caee441fdc2835fd732780fbf2a6a11101e025d140b14c7f794d7f3e99b1c33f74916b05d49468d64bf06c312b651f2829cff560690f484de315a5dab9bef21

    • SSDEEP

      196608:da9+6Y7SOEibgRrwo8NUu7gh1a9+6Y7SOEibgRrwo8NUu7ghvyHFkr23LO:dFgRrwo8N41FgRrwo8N4vyC

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks