General
-
Target
2024-01-28_6f474b7399d12f4b728d53fddd9c8998_backswap_icedid_xmrig
-
Size
31.1MB
-
Sample
240128-yjgmqaadhq
-
MD5
6f474b7399d12f4b728d53fddd9c8998
-
SHA1
fa1b4848320652cb35bdf00e13e93ffca463821e
-
SHA256
c44c590e1ffd7ee93d2c08c4a39981ba311a9949fb652f24d09dccc8a0d2ca16
-
SHA512
9777a9b390131189d8e6de38a2d87f49ee98a3e70a7fbd71d92c940ba110f1458cfabd3ba6cedd184e4dd01c52f3caf44463e07f1b4bebbba2d0e5707a28235c
-
SSDEEP
393216:dFgRavDllryzuhiQfKWiGo0PqbsBDT6t7:zvDllry2Lz56h
Behavioral task
behavioral1
Sample
2024-01-28_6f474b7399d12f4b728d53fddd9c8998_backswap_icedid_xmrig.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2024-01-28_6f474b7399d12f4b728d53fddd9c8998_backswap_icedid_xmrig
-
Size
31.1MB
-
MD5
6f474b7399d12f4b728d53fddd9c8998
-
SHA1
fa1b4848320652cb35bdf00e13e93ffca463821e
-
SHA256
c44c590e1ffd7ee93d2c08c4a39981ba311a9949fb652f24d09dccc8a0d2ca16
-
SHA512
9777a9b390131189d8e6de38a2d87f49ee98a3e70a7fbd71d92c940ba110f1458cfabd3ba6cedd184e4dd01c52f3caf44463e07f1b4bebbba2d0e5707a28235c
-
SSDEEP
393216:dFgRavDllryzuhiQfKWiGo0PqbsBDT6t7:zvDllry2Lz56h
-
Detect Blackmoon payload
-
XMRig Miner payload
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2