General

  • Target

    2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer

  • Size

    2.3MB

  • Sample

    241126-f4nmnatjdm

  • MD5

    796a64f3468d20acdecb486bbafb9d54

  • SHA1

    147946b22255931da9cba6bce6cedc50c76cc5e1

  • SHA256

    bb846882b3def0776589b707f28a52dabacc9f7745c4943d912f33e957b32f61

  • SHA512

    0dc326f3e561dd7a0b7c1c1f77d873644075dab260747d7b0b5efa52c3d47fba282ea65cee07b98286a1747b04645e05205bb586acb5281e2c0fa64327914a9d

  • SSDEEP

    49152:XCkCFdSRfMMMMM2MMMMMARfMMMMM2MMMMMvnBEf2CkCFdSRfMMMMM2MMMMMARfMu:ykCuRfMMMMM2MMMMMARfMMMMM2MMMMMF

Malware Config

Targets

    • Target

      2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer

    • Size

      2.3MB

    • MD5

      796a64f3468d20acdecb486bbafb9d54

    • SHA1

      147946b22255931da9cba6bce6cedc50c76cc5e1

    • SHA256

      bb846882b3def0776589b707f28a52dabacc9f7745c4943d912f33e957b32f61

    • SHA512

      0dc326f3e561dd7a0b7c1c1f77d873644075dab260747d7b0b5efa52c3d47fba282ea65cee07b98286a1747b04645e05205bb586acb5281e2c0fa64327914a9d

    • SSDEEP

      49152:XCkCFdSRfMMMMM2MMMMMARfMMMMM2MMMMMvnBEf2CkCFdSRfMMMMM2MMMMMARfMu:ykCuRfMMMMM2MMMMMARfMMMMM2MMMMMF

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks