General

  • Target

    2f5723261e86cc2197ffff80cfb6cb06_icedid_xiaobaminer_JC.exe

  • Size

    1.1MB

  • Sample

    230818-sjv78aba83

  • MD5

    2f5723261e86cc2197ffff80cfb6cb06

  • SHA1

    de789c4160d1d64e83b844e9136b2cd54baa494f

  • SHA256

    4aaf6246d69cba5afae93013c988b70c6adec4b93d18381c6249539ab87b810a

  • SHA512

    64cef80a923007a39a5ad5326aa03c38f4163a88ed58a00f3b3f67e748f065f1558fc233d3ab39cad97a0b210255dc3751f5e5df323e09e00b7b566a43632e8f

  • SSDEEP

    12288:9bu+yrST7EJ2dMbCH9Eq+0BbSox1QRhOTDyVGtHrDoQVHba0wYg:9bByw7EJ6eCHPb9AFV+HrD7a0Pg

Malware Config

Targets

    • Target

      2f5723261e86cc2197ffff80cfb6cb06_icedid_xiaobaminer_JC.exe

    • Size

      1.1MB

    • MD5

      2f5723261e86cc2197ffff80cfb6cb06

    • SHA1

      de789c4160d1d64e83b844e9136b2cd54baa494f

    • SHA256

      4aaf6246d69cba5afae93013c988b70c6adec4b93d18381c6249539ab87b810a

    • SHA512

      64cef80a923007a39a5ad5326aa03c38f4163a88ed58a00f3b3f67e748f065f1558fc233d3ab39cad97a0b210255dc3751f5e5df323e09e00b7b566a43632e8f

    • SSDEEP

      12288:9bu+yrST7EJ2dMbCH9Eq+0BbSox1QRhOTDyVGtHrDoQVHba0wYg:9bByw7EJ6eCHPb9AFV+HrD7a0Pg

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks