General

  • Target

    Chrome.msi

  • Size

    14.6MB

  • Sample

    250221-2rslqstqt5

  • MD5

    1ac2f26a8d6237713f6120d9272de355

  • SHA1

    20f8d75d976f7af644bf8479ab1e611fe5bea55f

  • SHA256

    1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109

  • SHA512

    150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444

  • SSDEEP

    393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz

Malware Config

Targets

    • Target

      Chrome.msi

    • Size

      14.6MB

    • MD5

      1ac2f26a8d6237713f6120d9272de355

    • SHA1

      20f8d75d976f7af644bf8479ab1e611fe5bea55f

    • SHA256

      1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109

    • SHA512

      150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444

    • SSDEEP

      393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatalrat family

    • Fatal Rat payload

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks