General

  • Target

    9c53c3c75288ff4116cebf689ed52674_icedid_xiaobaminer_JC.exe

  • Size

    775KB

  • Sample

    230808-vrrk4sfh61

  • MD5

    9c53c3c75288ff4116cebf689ed52674

  • SHA1

    d73954339c75be02c5eff314eac3a1f283895c55

  • SHA256

    a503185fda9f0f132fd7b49bfd6998e3f85088840b3a2ae7d64bcf9bcc13f852

  • SHA512

    6be6a08276f6281e4fa41bc363bf64ae832c741a1431c35fcaa299c5a6df866c6bb47cb5cf7e24f0532edee0d1e2895fd42b5211093fa84fe63dc1b1902ae575

  • SSDEEP

    12288:9bu+yrST7EJLbu+yrST7EJWhuhT3VB3NhcQiHmNJLBIuntH:9bByw7EJLbByw7EJKC3TNhiGnBIutH

Malware Config

Targets

    • Target

      9c53c3c75288ff4116cebf689ed52674_icedid_xiaobaminer_JC.exe

    • Size

      775KB

    • MD5

      9c53c3c75288ff4116cebf689ed52674

    • SHA1

      d73954339c75be02c5eff314eac3a1f283895c55

    • SHA256

      a503185fda9f0f132fd7b49bfd6998e3f85088840b3a2ae7d64bcf9bcc13f852

    • SHA512

      6be6a08276f6281e4fa41bc363bf64ae832c741a1431c35fcaa299c5a6df866c6bb47cb5cf7e24f0532edee0d1e2895fd42b5211093fa84fe63dc1b1902ae575

    • SSDEEP

      12288:9bu+yrST7EJLbu+yrST7EJWhuhT3VB3NhcQiHmNJLBIuntH:9bByw7EJLbByw7EJKC3TNhiGnBIutH

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks