General

  • Target

    2024-12-20_f38a6668b924fb372300590fd25ef131_icedid_xmrig

  • Size

    6.2MB

  • Sample

    241220-3daz7sxkdl

  • MD5

    f38a6668b924fb372300590fd25ef131

  • SHA1

    1626d09511dc028de308c534cdbe88f1f8b69d95

  • SHA256

    8ec769f6b8becd4f90843a9d677c77fecd0d058bbd41dbb80ab731db3a4daa82

  • SHA512

    1f8c93cba2d82608c65f09be606268044e30de157642675c4eacf765483b4215e0b97962640010afea915e80cbc31e4fae14628b79d8e9401f33f064af663718

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy91SHIo5nBnEQWoYIsaOyk3xKOBla:da9+6Y7SOEibgRrwoCBTYSOyCM

Malware Config

Targets

    • Target

      2024-12-20_f38a6668b924fb372300590fd25ef131_icedid_xmrig

    • Size

      6.2MB

    • MD5

      f38a6668b924fb372300590fd25ef131

    • SHA1

      1626d09511dc028de308c534cdbe88f1f8b69d95

    • SHA256

      8ec769f6b8becd4f90843a9d677c77fecd0d058bbd41dbb80ab731db3a4daa82

    • SHA512

      1f8c93cba2d82608c65f09be606268044e30de157642675c4eacf765483b4215e0b97962640010afea915e80cbc31e4fae14628b79d8e9401f33f064af663718

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy91SHIo5nBnEQWoYIsaOyk3xKOBla:da9+6Y7SOEibgRrwoCBTYSOyCM

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks