General

  • Target

    20bac99072da9f51cf55601e720a6246_icedid_xiaobaminer_JC.exe

  • Size

    2.1MB

  • Sample

    230817-xbcs5adh2w

  • MD5

    20bac99072da9f51cf55601e720a6246

  • SHA1

    e2473a6ae685c52d40d8821016d84bd8306c7e6c

  • SHA256

    7f1c77786fecefca4f5aabfb1ab90eeefc9c0f6002762201a29eb33630c33083

  • SHA512

    eac223568f16e3d355236a6cb7473bb5ee4a7d785a399fbd4becf56d013f9b1090c0627155e8c4397b9c400b777917cc1963f6c2db6465d07c40189b3eec212c

  • SSDEEP

    49152:9bYwIkppisrPa0PgYcM8F+0EYcMpVdn0UTF:yciKg5FFNE5wt

Malware Config

Targets

    • Target

      20bac99072da9f51cf55601e720a6246_icedid_xiaobaminer_JC.exe

    • Size

      2.1MB

    • MD5

      20bac99072da9f51cf55601e720a6246

    • SHA1

      e2473a6ae685c52d40d8821016d84bd8306c7e6c

    • SHA256

      7f1c77786fecefca4f5aabfb1ab90eeefc9c0f6002762201a29eb33630c33083

    • SHA512

      eac223568f16e3d355236a6cb7473bb5ee4a7d785a399fbd4becf56d013f9b1090c0627155e8c4397b9c400b777917cc1963f6c2db6465d07c40189b3eec212c

    • SSDEEP

      49152:9bYwIkppisrPa0PgYcM8F+0EYcMpVdn0UTF:yciKg5FFNE5wt

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks