General

  • Target

    638887048ee6a9efeaa8d706313373b4_icedid_xiaobaminer_JC.exe

  • Size

    7.0MB

  • Sample

    230804-v2h2qaec8t

  • MD5

    638887048ee6a9efeaa8d706313373b4

  • SHA1

    1573be2bf471838581dac71f7862353b06d0a24a

  • SHA256

    822fa7a3b982a9ecb57bbaaa9d29174b4fd3f2b265ecb3aa32f0d5076570a274

  • SHA512

    23ed3d8b83cdc739018e0aef970d299dd5b745668a3e573b86f42bd7c122ad11b9fd075443733df2362bb964ebd79e2a4599534ecb8b86a7116a93a5d3272626

  • SSDEEP

    196608:loZGBfWa8rGBfWJGBfWJGBfWJGBfWdGBfWU9yZGBfWJGBfWJGBfWX:BWa8YWeWeWeW6WgyOWeWeWX

Malware Config

Targets

    • Target

      638887048ee6a9efeaa8d706313373b4_icedid_xiaobaminer_JC.exe

    • Size

      7.0MB

    • MD5

      638887048ee6a9efeaa8d706313373b4

    • SHA1

      1573be2bf471838581dac71f7862353b06d0a24a

    • SHA256

      822fa7a3b982a9ecb57bbaaa9d29174b4fd3f2b265ecb3aa32f0d5076570a274

    • SHA512

      23ed3d8b83cdc739018e0aef970d299dd5b745668a3e573b86f42bd7c122ad11b9fd075443733df2362bb964ebd79e2a4599534ecb8b86a7116a93a5d3272626

    • SSDEEP

      196608:loZGBfWa8rGBfWJGBfWJGBfWJGBfWdGBfWU9yZGBfWJGBfWJGBfWX:BWa8YWeWeWeW6WgyOWeWeWX

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks