General

  • Target

    2024-05-03_1422bca928708b036bba8ef1554f3c9c_icedid_xiaobaminer

  • Size

    1.4MB

  • Sample

    240503-qvqe1agd8t

  • MD5

    1422bca928708b036bba8ef1554f3c9c

  • SHA1

    11a00cfb0b599993d80b4ca7d05f993ebc1b3214

  • SHA256

    029b83a546cd279cb39c2deea17a4c1b04d17093874b578f381d6802fa2d7316

  • SHA512

    35f82bfa02bdb91ad79af21eadfca5907e094ccb74da20ea7c7adfc2dd5d25d8547858fcd90b144d6517e8390999d58d3ec50c504f8b6359a331f4d5771c6310

  • SSDEEP

    24576:7wRyG1Z3jc1VCrNHtBCACH5jcAkSYqyE25jcAkSYqyEE:7wIGnzcErNNQJlpYqcpYqk

Malware Config

Targets

    • Target

      2024-05-03_1422bca928708b036bba8ef1554f3c9c_icedid_xiaobaminer

    • Size

      1.4MB

    • MD5

      1422bca928708b036bba8ef1554f3c9c

    • SHA1

      11a00cfb0b599993d80b4ca7d05f993ebc1b3214

    • SHA256

      029b83a546cd279cb39c2deea17a4c1b04d17093874b578f381d6802fa2d7316

    • SHA512

      35f82bfa02bdb91ad79af21eadfca5907e094ccb74da20ea7c7adfc2dd5d25d8547858fcd90b144d6517e8390999d58d3ec50c504f8b6359a331f4d5771c6310

    • SSDEEP

      24576:7wRyG1Z3jc1VCrNHtBCACH5jcAkSYqyE25jcAkSYqyEE:7wIGnzcErNNQJlpYqcpYqk

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks