General

  • Target

    2024-11-02_e35a7dc1dc77bcb54158b98848cbec02_icedid_xmrig

  • Size

    6.3MB

  • Sample

    241102-b2cp6ayqfj

  • MD5

    e35a7dc1dc77bcb54158b98848cbec02

  • SHA1

    20a4a6139d339ccd90249e1c69b78b22d21c4ebc

  • SHA256

    1ad1f2b330384e77147c79eb8945c372e8b6709b4541cee99fa68a968e77645a

  • SHA512

    28d0d8305e05867030b73741c8ae7db4419e82ad8f356c9a8fc75d21a2a704e95ce398b48cee7a179f52b02661242e69e1bca7f71fc3fccfeb9db35058e41e3b

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR/aEK+JLl7CCF/zWqjbdxMMgMMTGgh0Jg1QOeo:da9+6Y7SOEibgR8+T3b7ghh

Malware Config

Targets

    • Target

      2024-11-02_e35a7dc1dc77bcb54158b98848cbec02_icedid_xmrig

    • Size

      6.3MB

    • MD5

      e35a7dc1dc77bcb54158b98848cbec02

    • SHA1

      20a4a6139d339ccd90249e1c69b78b22d21c4ebc

    • SHA256

      1ad1f2b330384e77147c79eb8945c372e8b6709b4541cee99fa68a968e77645a

    • SHA512

      28d0d8305e05867030b73741c8ae7db4419e82ad8f356c9a8fc75d21a2a704e95ce398b48cee7a179f52b02661242e69e1bca7f71fc3fccfeb9db35058e41e3b

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR/aEK+JLl7CCF/zWqjbdxMMgMMTGgh0Jg1QOeo:da9+6Y7SOEibgR8+T3b7ghh

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks