General

  • Target

    2024-12-18_d1f729a2a9d4f38821de044e2fb1c0d4_icedid_xmrig

  • Size

    3.9MB

  • Sample

    241218-3d5vkswpfx

  • MD5

    d1f729a2a9d4f38821de044e2fb1c0d4

  • SHA1

    a3f63311842060aa610b05874db6adf65078b1dd

  • SHA256

    97b27d719c6b3dd746333b375444a9da86cff1c438e81fa5289868e97aba74c6

  • SHA512

    a741179f5d73c4ef6eb3fc0d90f7c3fd8ab29431ed7bbd094d1f80fd7da36e912ccbb6fb1d65756beec92a9e8e083525a3765f7fe48cca69ac73a7350c70402b

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR/3ziF3FNUgaGa+:da9+6Y7SOEibgR/DiFVNUw

Malware Config

Targets

    • Target

      2024-12-18_d1f729a2a9d4f38821de044e2fb1c0d4_icedid_xmrig

    • Size

      3.9MB

    • MD5

      d1f729a2a9d4f38821de044e2fb1c0d4

    • SHA1

      a3f63311842060aa610b05874db6adf65078b1dd

    • SHA256

      97b27d719c6b3dd746333b375444a9da86cff1c438e81fa5289868e97aba74c6

    • SHA512

      a741179f5d73c4ef6eb3fc0d90f7c3fd8ab29431ed7bbd094d1f80fd7da36e912ccbb6fb1d65756beec92a9e8e083525a3765f7fe48cca69ac73a7350c70402b

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR/3ziF3FNUgaGa+:da9+6Y7SOEibgR/DiFVNUw

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks