General

  • Target

    2025-04-01_38879c1b01531edda697b125a34e457a_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    8.2MB

  • Sample

    250401-2vgcwaxvhz

  • MD5

    38879c1b01531edda697b125a34e457a

  • SHA1

    f319058ff55d82104689b37bcafd402f7babb612

  • SHA256

    85c3074f7e34ee0185422160acc67af0e20efe578286bbeb7f0772b90ff0ffea

  • SHA512

    dad05610849f814c36622edf769c2b46feae98ce85c826fdf9208a838e62c76131de4dcd87ce7bbc54e737aa1be07abc8b4aad617787921a23648eed12791c15

  • SSDEEP

    98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z696Pbtf/nbXaPw:VWyZ/K0ttYVAATt6Z6OtDXF

Malware Config

Targets

    • Target

      2025-04-01_38879c1b01531edda697b125a34e457a_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      8.2MB

    • MD5

      38879c1b01531edda697b125a34e457a

    • SHA1

      f319058ff55d82104689b37bcafd402f7babb612

    • SHA256

      85c3074f7e34ee0185422160acc67af0e20efe578286bbeb7f0772b90ff0ffea

    • SHA512

      dad05610849f814c36622edf769c2b46feae98ce85c826fdf9208a838e62c76131de4dcd87ce7bbc54e737aa1be07abc8b4aad617787921a23648eed12791c15

    • SSDEEP

      98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z696Pbtf/nbXaPw:VWyZ/K0ttYVAATt6Z6OtDXF

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks