General

  • Target

    2024-12-22_f78545d3f08f2f30c316af6ac86c3d30_hijackloader_icedid_xiaobaminer

  • Size

    70.3MB

  • Sample

    241222-yz43ysxpa1

  • MD5

    f78545d3f08f2f30c316af6ac86c3d30

  • SHA1

    47299c05349d7b3b99ddab59436a9213754fbb8a

  • SHA256

    91f48ed696bd6148bbc6fa53d805a788a5282f6efb1466640d2301db6b98d731

  • SHA512

    2bc1252d888190bece3188ba1df9880b961f8589e47a8b3b98dacde7c3ae4fe20318628f127e4a993e800508ebc886021cbb79703a070c69b479c6a72c478402

  • SSDEEP

    393216:/+e+Nqlq4+e+Nqlqrd80PC+XX6tptGUXqyfovfgrUS4geihm2HnHkeIg5VdOyukI:sqlq3qlqYQDuIoPnlYNvx9

Malware Config

Targets

    • Target

      2024-12-22_f78545d3f08f2f30c316af6ac86c3d30_hijackloader_icedid_xiaobaminer

    • Size

      70.3MB

    • MD5

      f78545d3f08f2f30c316af6ac86c3d30

    • SHA1

      47299c05349d7b3b99ddab59436a9213754fbb8a

    • SHA256

      91f48ed696bd6148bbc6fa53d805a788a5282f6efb1466640d2301db6b98d731

    • SHA512

      2bc1252d888190bece3188ba1df9880b961f8589e47a8b3b98dacde7c3ae4fe20318628f127e4a993e800508ebc886021cbb79703a070c69b479c6a72c478402

    • SSDEEP

      393216:/+e+Nqlq4+e+Nqlqrd80PC+XX6tptGUXqyfovfgrUS4geihm2HnHkeIg5VdOyukI:sqlq3qlqYQDuIoPnlYNvx9

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks