General

  • Target

    2024-12-25_1315694ba11371473ad3cd37827accbe_icedid_xmrig

  • Size

    3.6MB

  • Sample

    241225-1979gazqeq

  • MD5

    1315694ba11371473ad3cd37827accbe

  • SHA1

    3ee5208816366d3133eae6b5476e4528ea29ef1b

  • SHA256

    a52dbd641b6bcb0e32642a1ca0e27ce46ec1394161c7e8e6773bdb7013f38f2e

  • SHA512

    fd7c5e91f923f1166e9af07b0cde70e1d4dcb8b4a8390683cb8e916973beb085023af4a5590620dcdb4256209c095ed8a671eede3491016a104993d412ba1148

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9iLqLs:da9+6Y7SOEibgRr8

Malware Config

Targets

    • Target

      2024-12-25_1315694ba11371473ad3cd37827accbe_icedid_xmrig

    • Size

      3.6MB

    • MD5

      1315694ba11371473ad3cd37827accbe

    • SHA1

      3ee5208816366d3133eae6b5476e4528ea29ef1b

    • SHA256

      a52dbd641b6bcb0e32642a1ca0e27ce46ec1394161c7e8e6773bdb7013f38f2e

    • SHA512

      fd7c5e91f923f1166e9af07b0cde70e1d4dcb8b4a8390683cb8e916973beb085023af4a5590620dcdb4256209c095ed8a671eede3491016a104993d412ba1148

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgR98Jy9iLqLs:da9+6Y7SOEibgRr8

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks