General

  • Target

    395552d6e1515dcedbbd508e3707ade9_icedid_xiaobaminer_JC.exe

  • Size

    784KB

  • Sample

    230802-t48vgsgh2z

  • MD5

    395552d6e1515dcedbbd508e3707ade9

  • SHA1

    01b59fafe58e9a0e4b5588e87c1ea79954f4473a

  • SHA256

    8424bed262249ef6b3aa75e02c5263bc34831f8f55df398230ccb4d5c0e306ef

  • SHA512

    c9abdd3297388bbaa95092716e464289a0ae9b2a8b04e3fb18cda741b1438d714c7cafd7077494d8299f2502d15038475cd9da7c9d3b7445e37ff30ad9ff8461

  • SSDEEP

    12288:9bu+yrST7EJ2S3sWcRGJlFoWcRGJlFoWcRGJlFu:9bByw7EJNcMJlHcMJlHcMJlY

Malware Config

Targets

    • Target

      395552d6e1515dcedbbd508e3707ade9_icedid_xiaobaminer_JC.exe

    • Size

      784KB

    • MD5

      395552d6e1515dcedbbd508e3707ade9

    • SHA1

      01b59fafe58e9a0e4b5588e87c1ea79954f4473a

    • SHA256

      8424bed262249ef6b3aa75e02c5263bc34831f8f55df398230ccb4d5c0e306ef

    • SHA512

      c9abdd3297388bbaa95092716e464289a0ae9b2a8b04e3fb18cda741b1438d714c7cafd7077494d8299f2502d15038475cd9da7c9d3b7445e37ff30ad9ff8461

    • SSDEEP

      12288:9bu+yrST7EJ2S3sWcRGJlFoWcRGJlFoWcRGJlFu:9bByw7EJNcMJlHcMJlHcMJlY

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks