General

  • Target

    2024-11-19_9e149ee208105c7aa7a4701098f2666f_icedid_xmrig

  • Size

    5.1MB

  • Sample

    241119-d4drcazhqj

  • MD5

    9e149ee208105c7aa7a4701098f2666f

  • SHA1

    e5840daae5662429add1224ad8028f1fe339235c

  • SHA256

    a04e7c850c5cf963808be51e7eecb69be094c4856a8b37d8c9c04e54d1d13806

  • SHA512

    8bc384437ccb4ea51d7c8a17f8f0b998aca0b3b77167a833f5aca38ba44b7608a443d9a249b67c5291ea26a2e29933b00444c87b1276b7391b7dbeba05c0833a

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9FJy9EVa/K+JLRaZ:da9+6Y7SOEibgRrgEX+E

Malware Config

Targets

    • Target

      2024-11-19_9e149ee208105c7aa7a4701098f2666f_icedid_xmrig

    • Size

      5.1MB

    • MD5

      9e149ee208105c7aa7a4701098f2666f

    • SHA1

      e5840daae5662429add1224ad8028f1fe339235c

    • SHA256

      a04e7c850c5cf963808be51e7eecb69be094c4856a8b37d8c9c04e54d1d13806

    • SHA512

      8bc384437ccb4ea51d7c8a17f8f0b998aca0b3b77167a833f5aca38ba44b7608a443d9a249b67c5291ea26a2e29933b00444c87b1276b7391b7dbeba05c0833a

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9FJy9EVa/K+JLRaZ:da9+6Y7SOEibgRrgEX+E

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks