General

  • Target

    2024-01-28_6f474b7399d12f4b728d53fddd9c8998_backswap_icedid_xmrig

  • Size

    31.1MB

  • Sample

    240128-yjgmqaadhq

  • MD5

    6f474b7399d12f4b728d53fddd9c8998

  • SHA1

    fa1b4848320652cb35bdf00e13e93ffca463821e

  • SHA256

    c44c590e1ffd7ee93d2c08c4a39981ba311a9949fb652f24d09dccc8a0d2ca16

  • SHA512

    9777a9b390131189d8e6de38a2d87f49ee98a3e70a7fbd71d92c940ba110f1458cfabd3ba6cedd184e4dd01c52f3caf44463e07f1b4bebbba2d0e5707a28235c

  • SSDEEP

    393216:dFgRavDllryzuhiQfKWiGo0PqbsBDT6t7:zvDllry2Lz56h

Malware Config

Targets

    • Target

      2024-01-28_6f474b7399d12f4b728d53fddd9c8998_backswap_icedid_xmrig

    • Size

      31.1MB

    • MD5

      6f474b7399d12f4b728d53fddd9c8998

    • SHA1

      fa1b4848320652cb35bdf00e13e93ffca463821e

    • SHA256

      c44c590e1ffd7ee93d2c08c4a39981ba311a9949fb652f24d09dccc8a0d2ca16

    • SHA512

      9777a9b390131189d8e6de38a2d87f49ee98a3e70a7fbd71d92c940ba110f1458cfabd3ba6cedd184e4dd01c52f3caf44463e07f1b4bebbba2d0e5707a28235c

    • SSDEEP

      393216:dFgRavDllryzuhiQfKWiGo0PqbsBDT6t7:zvDllry2Lz56h

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks