General

  • Target

    2024-11-15_02e5a1b9c68f5d399b4a7868a9ec6bfd_icedid_xmrig

  • Size

    6.3MB

  • Sample

    241115-cvpxkswpc1

  • MD5

    02e5a1b9c68f5d399b4a7868a9ec6bfd

  • SHA1

    4aa123055f713a2639d3f050f04321c71fd34fdd

  • SHA256

    c72f1e43980d8e0b7f407223c780189ca1027eda4625a753f36bd2587e9f3ad4

  • SHA512

    e3254be8c57e63781a34e3ef4fa8c197ebadbc19b1248374d49a15ee467a56f845491d49e0591643591853ad6669656817a350e4a2a89e9a4b6405d514ab305b

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgRiZPYtOOniQHkmy1y3JyZlIu3aiLgt2:da9+6Y7SOEibgRihQHpEy3JyZKuKY

Malware Config

Targets

    • Target

      2024-11-15_02e5a1b9c68f5d399b4a7868a9ec6bfd_icedid_xmrig

    • Size

      6.3MB

    • MD5

      02e5a1b9c68f5d399b4a7868a9ec6bfd

    • SHA1

      4aa123055f713a2639d3f050f04321c71fd34fdd

    • SHA256

      c72f1e43980d8e0b7f407223c780189ca1027eda4625a753f36bd2587e9f3ad4

    • SHA512

      e3254be8c57e63781a34e3ef4fa8c197ebadbc19b1248374d49a15ee467a56f845491d49e0591643591853ad6669656817a350e4a2a89e9a4b6405d514ab305b

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgRiZPYtOOniQHkmy1y3JyZlIu3aiLgt2:da9+6Y7SOEibgRihQHpEy3JyZKuKY

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks