General

  • Target

    2025-01-29_6388a745a784dcf0d397993de0821c46_icedid_xmrig

  • Size

    17.0MB

  • Sample

    250129-xg3azavpep

  • MD5

    6388a745a784dcf0d397993de0821c46

  • SHA1

    ab4af1d87f24740ece33e22297fbeb9ccaa67005

  • SHA256

    2422721a231f0d83fbfecfac0f07853ad36436bd9c2d088cd202f503847371ef

  • SHA512

    9fbd2b46ef1168c09b6f0f4085cc01e8097c923cddb00af9d9489e3c9121e4322cad79143e7c3ffb60652c2711cd63995f6726d5a19f5fb61f1e13558c0a8458

  • SSDEEP

    196608:da9+6Y7SOEibgRkRGBfWLZPzmGP8k1o8a9+6Y7SOEibgRkRGBfWLZPzmGP8k1oZd:dFgRk2WcGP1LFgRk2WcGP11C5

Malware Config

Targets

    • Target

      2025-01-29_6388a745a784dcf0d397993de0821c46_icedid_xmrig

    • Size

      17.0MB

    • MD5

      6388a745a784dcf0d397993de0821c46

    • SHA1

      ab4af1d87f24740ece33e22297fbeb9ccaa67005

    • SHA256

      2422721a231f0d83fbfecfac0f07853ad36436bd9c2d088cd202f503847371ef

    • SHA512

      9fbd2b46ef1168c09b6f0f4085cc01e8097c923cddb00af9d9489e3c9121e4322cad79143e7c3ffb60652c2711cd63995f6726d5a19f5fb61f1e13558c0a8458

    • SSDEEP

      196608:da9+6Y7SOEibgRkRGBfWLZPzmGP8k1o8a9+6Y7SOEibgRkRGBfWLZPzmGP8k1oZd:dFgRk2WcGP1LFgRk2WcGP11C5

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks