General

  • Target

    2024-11-11_683a1d6008b1c7cb3760ec6ae58e1c09_icedid_xmrig

  • Size

    2.3MB

  • Sample

    241111-zyw7dsvrdw

  • MD5

    683a1d6008b1c7cb3760ec6ae58e1c09

  • SHA1

    4771e4676e5794d3df34c57fa5cf91b5a66f1377

  • SHA256

    654be7bd25a6b517204ef9b733bd0d183ae90b1a7dce7d07cb0e509a202f8757

  • SHA512

    87334af9bb43071d224e9911cf2b43665877589b7a6e11391425630dfa9fe8dd9ff4573ee7550c924cd4b9cb4bd1a9d46c34d9ec8c4e1b5308fa1636f088465e

  • SSDEEP

    49152:aDsvf45m/Ymo1JEd4ts6Y9NSOE/R+rJ9lgk+HX/SbgRF31/BDm:dvfapmo1Y4+6Y7SOEfX/SbgRo

Malware Config

Targets

    • Target

      2024-11-11_683a1d6008b1c7cb3760ec6ae58e1c09_icedid_xmrig

    • Size

      2.3MB

    • MD5

      683a1d6008b1c7cb3760ec6ae58e1c09

    • SHA1

      4771e4676e5794d3df34c57fa5cf91b5a66f1377

    • SHA256

      654be7bd25a6b517204ef9b733bd0d183ae90b1a7dce7d07cb0e509a202f8757

    • SHA512

      87334af9bb43071d224e9911cf2b43665877589b7a6e11391425630dfa9fe8dd9ff4573ee7550c924cd4b9cb4bd1a9d46c34d9ec8c4e1b5308fa1636f088465e

    • SSDEEP

      49152:aDsvf45m/Ymo1JEd4ts6Y9NSOE/R+rJ9lgk+HX/SbgRF31/BDm:dvfapmo1Y4+6Y7SOEfX/SbgRo

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks