General

  • Target

    2024-11-16_b9bb13af24880ca245a421ccdbc70e9d_icedid_xmrig

  • Size

    7.4MB

  • Sample

    241116-mp375avele

  • MD5

    b9bb13af24880ca245a421ccdbc70e9d

  • SHA1

    51f29d4a59e01ad29d1867aa494ad59d056bc7fc

  • SHA256

    6717d7099ac6cd30b4d0284144922528fe3d4a0c31e564e046d7ff1ff291ec54

  • SHA512

    ad5f3b68a9d535d57ecf8234a798fec90e683b5a59dda1c2d3687d93972e6d6ba43c4d02c6cc45975c92423f0885cd43db6fa3cb90df310e53188fe0f497a918

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR78kFw7UwrzKxU5:da9+6Y7SOEibgR7Xe7PV5

Malware Config

Targets

    • Target

      2024-11-16_b9bb13af24880ca245a421ccdbc70e9d_icedid_xmrig

    • Size

      7.4MB

    • MD5

      b9bb13af24880ca245a421ccdbc70e9d

    • SHA1

      51f29d4a59e01ad29d1867aa494ad59d056bc7fc

    • SHA256

      6717d7099ac6cd30b4d0284144922528fe3d4a0c31e564e046d7ff1ff291ec54

    • SHA512

      ad5f3b68a9d535d57ecf8234a798fec90e683b5a59dda1c2d3687d93972e6d6ba43c4d02c6cc45975c92423f0885cd43db6fa3cb90df310e53188fe0f497a918

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR78kFw7UwrzKxU5:da9+6Y7SOEibgR7Xe7PV5

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks