General

  • Target

    34baf560dfa05d8cf1e6fbde53f05363_icedid_xiaobaminer_JC.exe

  • Size

    5.0MB

  • Sample

    230801-v1nktaac22

  • MD5

    34baf560dfa05d8cf1e6fbde53f05363

  • SHA1

    76d650de345ce8463b644b532542ee2d09b4c9ef

  • SHA256

    123dcccd2da5b7e658a930bb036ad84073b10969877bfdc557a2e3b6549260d6

  • SHA512

    090ac0e4c80b7d74feb92a682859af0d82e0197b13f69a882a2ca5ab180571566a7093d0690bd2a4a390938d2dfd39d3ef79f582f51d405a9ddbfb7316c42631

  • SSDEEP

    49152:9bYwIkppisrPa0PdWbYwIkppisrPa0PdU0ThmEf2hvZPzN/xw6n1wRjJm6K4MCc4:yciK9ciKucf2xZPzNsG4086Lwb

Malware Config

Targets

    • Target

      34baf560dfa05d8cf1e6fbde53f05363_icedid_xiaobaminer_JC.exe

    • Size

      5.0MB

    • MD5

      34baf560dfa05d8cf1e6fbde53f05363

    • SHA1

      76d650de345ce8463b644b532542ee2d09b4c9ef

    • SHA256

      123dcccd2da5b7e658a930bb036ad84073b10969877bfdc557a2e3b6549260d6

    • SHA512

      090ac0e4c80b7d74feb92a682859af0d82e0197b13f69a882a2ca5ab180571566a7093d0690bd2a4a390938d2dfd39d3ef79f582f51d405a9ddbfb7316c42631

    • SSDEEP

      49152:9bYwIkppisrPa0PdWbYwIkppisrPa0PdU0ThmEf2hvZPzN/xw6n1wRjJm6K4MCc4:yciK9ciKucf2xZPzNsG4086Lwb

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks