General

  • Target

    2024-12-22_5e88229606acab4ef1b2765956e4006b_hijackloader_icedid_xiaobaminer

  • Size

    17.1MB

  • Sample

    241222-yrywzaxlgx

  • MD5

    5e88229606acab4ef1b2765956e4006b

  • SHA1

    e7821c7c5c623e1d62f57f5b55cc0cf0f880b021

  • SHA256

    08b2af0ecb95cbce084cda73c5ec8b055a6192bb7966baacccfcba3624d9db17

  • SHA512

    81c2e76d6afe11156fbb13502b81acb4dd4a44f2f4bd9602ad34fa5724dbf5dec27e391d0c486e93e339e66371c71f8cf97bde066aafc4df14083c410bc2f2a8

  • SSDEEP

    196608:lV+wug+CKmd0BKmd0dV+wug+CKmd0BKmd0+:/+e+Nqlq4+e+NqlqF

Malware Config

Targets

    • Target

      2024-12-22_5e88229606acab4ef1b2765956e4006b_hijackloader_icedid_xiaobaminer

    • Size

      17.1MB

    • MD5

      5e88229606acab4ef1b2765956e4006b

    • SHA1

      e7821c7c5c623e1d62f57f5b55cc0cf0f880b021

    • SHA256

      08b2af0ecb95cbce084cda73c5ec8b055a6192bb7966baacccfcba3624d9db17

    • SHA512

      81c2e76d6afe11156fbb13502b81acb4dd4a44f2f4bd9602ad34fa5724dbf5dec27e391d0c486e93e339e66371c71f8cf97bde066aafc4df14083c410bc2f2a8

    • SSDEEP

      196608:lV+wug+CKmd0BKmd0dV+wug+CKmd0BKmd0+:/+e+Nqlq4+e+NqlqF

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks