General

  • Target

    3688a31bd6273724217ed4de651162ce_icedid_xiaobaminer_JC.exe

  • Size

    2.6MB

  • Sample

    230801-wm5slsae42

  • MD5

    3688a31bd6273724217ed4de651162ce

  • SHA1

    74d561751fb834179d2b2e5f5620783725cb63e5

  • SHA256

    cdf31b82d2dc519aa3af5a47b0791fd33751792717674e7579f3d0cf9411b21c

  • SHA512

    3a33029d73fc07f94fd4bd73c4919beb25a6f4b8203e46830df2418cb477868bb87a86693942e85fe08a3487ce728da6118524547a91e6a623e1b6e5034ae80d

  • SSDEEP

    49152:9bYwIICRaYSDA+ouZ/K0tDmNhJXLkZRJ+0Y8TCXXJdWdYw6VdNRIky/Cr70QiB:yCCRUZ/K0tKNhJXKsdXXJdWGw6VdIkyl

Malware Config

Targets

    • Target

      3688a31bd6273724217ed4de651162ce_icedid_xiaobaminer_JC.exe

    • Size

      2.6MB

    • MD5

      3688a31bd6273724217ed4de651162ce

    • SHA1

      74d561751fb834179d2b2e5f5620783725cb63e5

    • SHA256

      cdf31b82d2dc519aa3af5a47b0791fd33751792717674e7579f3d0cf9411b21c

    • SHA512

      3a33029d73fc07f94fd4bd73c4919beb25a6f4b8203e46830df2418cb477868bb87a86693942e85fe08a3487ce728da6118524547a91e6a623e1b6e5034ae80d

    • SSDEEP

      49152:9bYwIICRaYSDA+ouZ/K0tDmNhJXLkZRJ+0Y8TCXXJdWdYw6VdNRIky/Cr70QiB:yCCRUZ/K0tKNhJXKsdXXJdWGw6VdIkyl

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks