General

  • Target

    2024-05-08_871ba697de97c8ee65a556cff1acfaa1_icedid_xiaobaminer

  • Size

    6.5MB

  • Sample

    240508-gl4ftsge99

  • MD5

    871ba697de97c8ee65a556cff1acfaa1

  • SHA1

    7235ff90eaacba053756d36799234eb891040e3e

  • SHA256

    a329da8fa8d5a0d1a3c8473586cd2ffda4374878005b0188f415b70d70deb7f0

  • SHA512

    41b412227992bee512bff7700ea17d987258dd364225a4e03a87ec210b00cce5bc9b9360a7451f15683765f60afa02c03c2815ea02f361e1bea14a936483dd9a

  • SSDEEP

    98304:SR6Z6Z6dXJdWGw6VdIky/Cr4QJWQtZ/K0tGOFWVRuLftCT:+6Z6Z6XUkfy/CMGWyZ/K0ttYVAAT

Malware Config

Targets

    • Target

      2024-05-08_871ba697de97c8ee65a556cff1acfaa1_icedid_xiaobaminer

    • Size

      6.5MB

    • MD5

      871ba697de97c8ee65a556cff1acfaa1

    • SHA1

      7235ff90eaacba053756d36799234eb891040e3e

    • SHA256

      a329da8fa8d5a0d1a3c8473586cd2ffda4374878005b0188f415b70d70deb7f0

    • SHA512

      41b412227992bee512bff7700ea17d987258dd364225a4e03a87ec210b00cce5bc9b9360a7451f15683765f60afa02c03c2815ea02f361e1bea14a936483dd9a

    • SSDEEP

      98304:SR6Z6Z6dXJdWGw6VdIky/Cr4QJWQtZ/K0tGOFWVRuLftCT:+6Z6Z6XUkfy/CMGWyZ/K0ttYVAAT

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks