General

  • Target

    2024-12-27_7ab019878e44c97ab6bd08b5f24b6d57_icedid_xmrig

  • Size

    3.2MB

  • Sample

    241227-ynnxlaymhz

  • MD5

    7ab019878e44c97ab6bd08b5f24b6d57

  • SHA1

    c260b66a45d9747239186a1117138da4c03f9365

  • SHA256

    c9a1098f87c0a492e7ec474e1466b57946b54474835d5b36f168823d5a83522a

  • SHA512

    de6e24f405d54042e80fe62721105c6c405152391565a18ebd5b1d2aaacbb60ec9fc4b6774bc68e64304ded53b2453b956b2f54eaa69c6d853d91437689792b4

  • SSDEEP

    49152:aDsvf45m/Ymo1JEd4ts6Y9NSOE/R+rJ9lgk+HX/SbgRFCaKVsVJ9y9EY6TKu:dvfapmo1Y4+6Y7SOEfX/SbgRzJy9K

Malware Config

Targets

    • Target

      2024-12-27_7ab019878e44c97ab6bd08b5f24b6d57_icedid_xmrig

    • Size

      3.2MB

    • MD5

      7ab019878e44c97ab6bd08b5f24b6d57

    • SHA1

      c260b66a45d9747239186a1117138da4c03f9365

    • SHA256

      c9a1098f87c0a492e7ec474e1466b57946b54474835d5b36f168823d5a83522a

    • SHA512

      de6e24f405d54042e80fe62721105c6c405152391565a18ebd5b1d2aaacbb60ec9fc4b6774bc68e64304ded53b2453b956b2f54eaa69c6d853d91437689792b4

    • SSDEEP

      49152:aDsvf45m/Ymo1JEd4ts6Y9NSOE/R+rJ9lgk+HX/SbgRFCaKVsVJ9y9EY6TKu:dvfapmo1Y4+6Y7SOEfX/SbgRzJy9K

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks