General

  • Target

    2024-12-22_86ba4e68955bdbff8c983c405f927bc9_hijackloader_icedid_xiaobaminer

  • Size

    59.1MB

  • Sample

    241222-ysw4rsxqel

  • MD5

    86ba4e68955bdbff8c983c405f927bc9

  • SHA1

    ef74c92578ea151305cb0d67572d5fd42c87ad9b

  • SHA256

    9739ba190a030736f068f536f2ba5fdc98b6813531d647ebe82c80d581eb4387

  • SHA512

    fd6d69256db8d88a7df3beb97cb39e410e4556301bf0711b25e2f6d7b9a59f85a81613941113e6f8f6502468d44fd1b2a689e770f97a77047ea47f2ea10298cc

  • SSDEEP

    393216:/+e+Nqlq4+e+NqlqnWXCRyr0pR3GMHEDdDdUiGaiZb4tpAHAj/YpCC4SVQQRXIwZ:sqlq3qlqO/Z0R5HRYA1zzR

Malware Config

Targets

    • Target

      2024-12-22_86ba4e68955bdbff8c983c405f927bc9_hijackloader_icedid_xiaobaminer

    • Size

      59.1MB

    • MD5

      86ba4e68955bdbff8c983c405f927bc9

    • SHA1

      ef74c92578ea151305cb0d67572d5fd42c87ad9b

    • SHA256

      9739ba190a030736f068f536f2ba5fdc98b6813531d647ebe82c80d581eb4387

    • SHA512

      fd6d69256db8d88a7df3beb97cb39e410e4556301bf0711b25e2f6d7b9a59f85a81613941113e6f8f6502468d44fd1b2a689e770f97a77047ea47f2ea10298cc

    • SSDEEP

      393216:/+e+Nqlq4+e+NqlqnWXCRyr0pR3GMHEDdDdUiGaiZb4tpAHAj/YpCC4SVQQRXIwZ:sqlq3qlqO/Z0R5HRYA1zzR

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks