General

  • Target

    2024-12-27_c48c3fd83ffd49c2b1692216d15e2dcc_icedid_xiaobaminer

  • Size

    907KB

  • Sample

    241227-nmp36avkes

  • MD5

    c48c3fd83ffd49c2b1692216d15e2dcc

  • SHA1

    3c0eb9217145d5e8d7c187eb74935b4918a6a7f7

  • SHA256

    b566852aea22739f69813e97b44b0373d91309c94de6c102d5c5140d10421afb

  • SHA512

    ac01f65d7293d5fe388796306443354c12f00681e8abd28fb28a2580a845bbf18e854f71c69477ecfc90ab9745b64dc175fad4edc5a2a91d94d4112a640b7c2c

  • SSDEEP

    24576:9bByw1Z3jc1VCrulw/CAVfWCWqqSwcBAlmR4HTFxKi:9bYwnzcErpaIpAlmR4HTei

Malware Config

Targets

    • Target

      2024-12-27_c48c3fd83ffd49c2b1692216d15e2dcc_icedid_xiaobaminer

    • Size

      907KB

    • MD5

      c48c3fd83ffd49c2b1692216d15e2dcc

    • SHA1

      3c0eb9217145d5e8d7c187eb74935b4918a6a7f7

    • SHA256

      b566852aea22739f69813e97b44b0373d91309c94de6c102d5c5140d10421afb

    • SHA512

      ac01f65d7293d5fe388796306443354c12f00681e8abd28fb28a2580a845bbf18e854f71c69477ecfc90ab9745b64dc175fad4edc5a2a91d94d4112a640b7c2c

    • SSDEEP

      24576:9bByw1Z3jc1VCrulw/CAVfWCWqqSwcBAlmR4HTFxKi:9bYwnzcErpaIpAlmR4HTei

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks