General

  • Target

    3957a042e21de23fab415a8bf23f9ca3_icedid_xiaobaminer_JC.exe

  • Size

    2.6MB

  • Sample

    230818-v365yadh8w

  • MD5

    3957a042e21de23fab415a8bf23f9ca3

  • SHA1

    614c26f443edf258345a697b7908260367f57ddf

  • SHA256

    3268866bdc953385c4f59778257dccc74499a42237fc14da85a7e6ee3a38eedc

  • SHA512

    48879affff58a5cde076ed7ef586d8d66c4209c86bc2fa2e79da21bc8213b7da08a27a63ebe02b8b9e485fc8287ffbf1819b514f92cfbb843b4ba8bfdaf50492

  • SSDEEP

    49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqk:ysnUm8U/6YR367

Malware Config

Targets

    • Target

      3957a042e21de23fab415a8bf23f9ca3_icedid_xiaobaminer_JC.exe

    • Size

      2.6MB

    • MD5

      3957a042e21de23fab415a8bf23f9ca3

    • SHA1

      614c26f443edf258345a697b7908260367f57ddf

    • SHA256

      3268866bdc953385c4f59778257dccc74499a42237fc14da85a7e6ee3a38eedc

    • SHA512

      48879affff58a5cde076ed7ef586d8d66c4209c86bc2fa2e79da21bc8213b7da08a27a63ebe02b8b9e485fc8287ffbf1819b514f92cfbb843b4ba8bfdaf50492

    • SSDEEP

      49152:9bYwIM/7t0i0FZaUm8cikLrpYqZRJ5pYqk:ysnUm8U/6YR367

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks