General

  • Target

    2025-04-01_438dce7f9927b74584b41f2bc29db2b0_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    6.3MB

  • Sample

    250401-2wqb6sxwa1

  • MD5

    438dce7f9927b74584b41f2bc29db2b0

  • SHA1

    79b41ce2cca86001d642b8f8387f3f2ea3b9a935

  • SHA256

    b08a93b5b3bf01d31197a9f46c996d0cd68d6fc440c651435285c528cbb965a3

  • SHA512

    16c76948287c5e955f5df7c1e0b62542dba099c8b405afef49225a8517f0f45d2aefdc61f01dbc0a3efe2fba5c8569a32ba68406c617a2437a9991d946cfb95e

  • SSDEEP

    49152:7iYgiAmOHYew6TKAQatzuvFS/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7Gp:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z625B

Malware Config

Targets

    • Target

      2025-04-01_438dce7f9927b74584b41f2bc29db2b0_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      6.3MB

    • MD5

      438dce7f9927b74584b41f2bc29db2b0

    • SHA1

      79b41ce2cca86001d642b8f8387f3f2ea3b9a935

    • SHA256

      b08a93b5b3bf01d31197a9f46c996d0cd68d6fc440c651435285c528cbb965a3

    • SHA512

      16c76948287c5e955f5df7c1e0b62542dba099c8b405afef49225a8517f0f45d2aefdc61f01dbc0a3efe2fba5c8569a32ba68406c617a2437a9991d946cfb95e

    • SSDEEP

      49152:7iYgiAmOHYew6TKAQatzuvFS/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7Gp:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z625B

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks