General

  • Target

    2025-04-01_b4241d686292f1023eef8bf8a981a270_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    9.2MB

  • Sample

    250401-xq3cbsxky8

  • MD5

    b4241d686292f1023eef8bf8a981a270

  • SHA1

    8efe05d007dd3687578149a49d992f82055eaaec

  • SHA256

    dd9a0b4298add14a9fb183e14ea6efc3753de378428573ee80402abd4306c5ea

  • SHA512

    b8b7a1948d759d0cb9f7a12d618a5b286e824a122a708abd09bf24c420343ae75cd5908a49bd6dc3ba665a8b6ee23f15c47649d396990af68ea9bb3aaaa7b386

  • SSDEEP

    98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6h9ek0oAaldmdmnp+:VWyZ/K0ttYVAATt6Z6SRKmd04

Malware Config

Targets

    • Target

      2025-04-01_b4241d686292f1023eef8bf8a981a270_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      9.2MB

    • MD5

      b4241d686292f1023eef8bf8a981a270

    • SHA1

      8efe05d007dd3687578149a49d992f82055eaaec

    • SHA256

      dd9a0b4298add14a9fb183e14ea6efc3753de378428573ee80402abd4306c5ea

    • SHA512

      b8b7a1948d759d0cb9f7a12d618a5b286e824a122a708abd09bf24c420343ae75cd5908a49bd6dc3ba665a8b6ee23f15c47649d396990af68ea9bb3aaaa7b386

    • SSDEEP

      98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6h9ek0oAaldmdmnp+:VWyZ/K0ttYVAATt6Z6SRKmd04

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks