General

  • Target

    65065792072b12d84f8db957c1d13be1_icedid_xiaobaminer_JC.exe

  • Size

    375KB

  • Sample

    230804-wdf3wsee61

  • MD5

    65065792072b12d84f8db957c1d13be1

  • SHA1

    5f381f38f207f0650edb74a425abaa82d66a7478

  • SHA256

    e8f3cb5d86992c2475d7e611b434fa164bfb7196dbf5ae23f49edb189be99085

  • SHA512

    60bc50e96e11c1f28432e26728cfaab4dcc0678d15ab44bb192a5ec22d1898a0d8f3e9ebef2349f53ae156c4210c18e8145a7ebe3dedda411a1485463f639e21

  • SSDEEP

    6144:9b4S+1Mvyr3UGv9JYT7E0CQPc8I6NfC2HnVq5D:9bu+yrST7EJicgNfVHVc

Malware Config

Targets

    • Target

      65065792072b12d84f8db957c1d13be1_icedid_xiaobaminer_JC.exe

    • Size

      375KB

    • MD5

      65065792072b12d84f8db957c1d13be1

    • SHA1

      5f381f38f207f0650edb74a425abaa82d66a7478

    • SHA256

      e8f3cb5d86992c2475d7e611b434fa164bfb7196dbf5ae23f49edb189be99085

    • SHA512

      60bc50e96e11c1f28432e26728cfaab4dcc0678d15ab44bb192a5ec22d1898a0d8f3e9ebef2349f53ae156c4210c18e8145a7ebe3dedda411a1485463f639e21

    • SSDEEP

      6144:9b4S+1Mvyr3UGv9JYT7E0CQPc8I6NfC2HnVq5D:9bu+yrST7EJicgNfVHVc

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks