File name: | 2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys |
Full analysis: | https://app.any.run/tasks/a786b5f4-0def-4698-ad53-39681357fdbd |
Verdict: | Malicious activity |
Threats: | BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods. |
Analysis date: | July 05, 2025, 22:37:17 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections |
MD5: | DA251FEF7EAE5721DFAD362F0C28E65B |
SHA1: | E27634548DDFB45B0D69D597EA3EC7B74D696932 |
SHA256: | E0122626BA51563AB0B06CFB3ADE6CECDDFCF6BC6A7E8EEC7F2E87B7265673F7 |
SSDEEP: | 98304:nTq+0EaSNCrfdo1K94oiDfIQ/BV6fJGJ3/NCFkx31QfNm7rNMZFCz3gqpI9qLEJS:kt5ZiSdD0dcMpH |
.exe | | | Win32 Executable MS Visual C++ (generic) (30.9) |
---|---|---|
.exe | | | Win64 Executable (generic) (27.3) |
.exe | | | UPX compressed Win32 Executable (26.8) |
.dll | | | Win32 Dynamic Link Library (generic) (6.5) |
.exe | | | Win32 Executable (generic) (4.4) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2018:01:10 12:57:18+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
PEType: | PE32 |
LinkerVersion: | 6 |
CodeSize: | 81920 |
InitializedDataSize: | 20480 |
UninitializedDataSize: | 241664 |
EntryPoint: | 0x9623 |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 3.2.2.2075 |
ProductVersionNumber: | 3.2.2.2075 |
FileFlagsMask: | 0x0000 |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Unknown |
FileSubtype: | - |
LanguageCode: | Chinese (Simplified) |
CharacterSet: | Unicode |
FileVersion: | 3, 2, 2, 2075 |
ProductVersion: | 3, 2, 2, 2075 |
CompanyName: | 360.cn |
FileDescription: | 360主动防御服务模块 |
InternalName: | ZhuDongFangYu |
LegalCopyright: | (C)360.cn All Rights Reserved. |
OriginalFileName: | ZhuDongFangYu.exe |
ProductName: | 360安全卫士 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
608 | %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 | C:\Windows\System32\csrss.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Client Server Runtime Process Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
1564 | "C:\Users\admin\Desktop\2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe" | C:\Users\admin\Desktop\2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe | — | explorer.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360主动防御服务模块 Exit code: 3221226540 Version: 3, 2, 2, 2075 Modules
| |||||||||||||||
2324 | C:\WINDOWS\360\360Safe\deepscan\ZhuDongFangYu.exe | C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe | — | explorer.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360主动防御服务模块 Exit code: 3221226540 Version: 3, 2, 2, 2075 Modules
| |||||||||||||||
2648 | "C:\Users\admin\Desktop\2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe" | C:\Users\admin\Desktop\2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe | explorer.exe | ||||||||||||
User: admin Company: 360.cn Integrity Level: HIGH Description: 360主动防御服务模块 Exit code: 0 Version: 3, 2, 2, 2075 Modules
| |||||||||||||||
2692 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
5244 | "C:\WINDOWS\360\360Safe\deepscan\ZhuDongFangYu.exe" | C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe | 2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe | ||||||||||||
User: admin Company: 360.cn Integrity Level: HIGH Description: 360主动防御服务模块 Version: 3, 2, 2, 2075 Modules
| |||||||||||||||
6948 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
Operation: | write | Name: | EnableLUA |
Value: 0 | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | ZhuDongFangYu |
Value: C:\WINDOWS\360\360Safe\deepscan\ZhuDongFangYu.exe | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
Operation: | write | Name: | Disableregistrytools |
Value: 1 | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL |
Operation: | write | Name: | CheckedValue |
Value: 0 | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer |
Operation: | write | Name: | NoFolderOptions |
Value: 1 | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer |
Operation: | write | Name: | Run |
Value: C:\WINDOWS\360\360Safe\deepscan\ZhuDongFangYu.exe | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot |
Operation: | delete value | Name: | Minimal |
Value: | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot |
Operation: | delete value | Name: | Network |
Value: | |||
(PID) Process: | (5244) ZhuDongFangYu.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network |
Operation: | delete key | Name: | (default) |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
5244 | ZhuDongFangYu.exe | — | ||
MD5:— | SHA256:— | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\SingleClientServicesUpdater.exe | — | |
MD5:— | SHA256:— | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe | — | |
MD5:— | SHA256:— | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\SingleClientServicesUpdater.exe | — | |
MD5:— | SHA256:— | |||
5244 | ZhuDongFangYu.exe | C:\autorun.inf | text | |
MD5:B7797020E13273644AE0A326876262AB | SHA256:B0CEAB4E6C8DC26EDB3A2005D40FE617F005688224F77CF0BBF39BD7D7117075 | |||
5244 | ZhuDongFangYu.exe | C:\RECYCLER\S-5-4-62-7581032776-5377505530-562822366-6588\ZhuDongFangYu.exe | executable | |
MD5:DA251FEF7EAE5721DFAD362F0C28E65B | SHA256:E0122626BA51563AB0B06CFB3ADE6CECDDFCF6BC6A7E8EEC7F2E87B7265673F7 | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe | executable | |
MD5:D9CA534C423AC3943FB33CB9F372ED39 | SHA256:86D05AC28C0406E604A87F9DDD06ABF759C29B137B8F32298637AB1D28E56CAF | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatInfo.exe | executable | |
MD5:4739D165FE1A3B630CF29DB044E4ED10 | SHA256:262DDD95BB400FE3336F56CA90E746E6DA805769C8BD656A2A4611C6B483C7EB | |||
2648 | 2025-07-05_da251fef7eae5721dfad362f0c28e65b_amadey_black-basta_elex_hellokitty_luca-stealer_rhadamanthys.exe | C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe | executable | |
MD5:DA251FEF7EAE5721DFAD362F0C28E65B | SHA256:E0122626BA51563AB0B06CFB3ADE6CECDDFCF6BC6A7E8EEC7F2E87B7265673F7 | |||
5244 | ZhuDongFangYu.exe | C:\Program Files\CCleaner\CCleaner.exe | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.216.77.6:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
6024 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |