General

  • Target

    2025-04-02_72560f3dba2e0029b7148676244a63bc_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    8.9MB

  • Sample

    250402-c7ktdszve1

  • MD5

    72560f3dba2e0029b7148676244a63bc

  • SHA1

    667e125842e4ddcef523c919b69cafb2ed17376c

  • SHA256

    ee9672a36f325585613b7b945d00e621451cc22385b7a3a4d8d5d2335da90c51

  • SHA512

    9c3b6017c72096e779e23cee2842d0d3c0b31603cb215d038d70550e9b530ce91d7728b94a34a980ba486db83194c8ca295b47875e0cbd020ca3b32c20aa56db

  • SSDEEP

    98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6h9eotaLapI9:VWyZ/K0ttYVAATt6Z6SogcI9

Malware Config

Targets

    • Target

      2025-04-02_72560f3dba2e0029b7148676244a63bc_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      8.9MB

    • MD5

      72560f3dba2e0029b7148676244a63bc

    • SHA1

      667e125842e4ddcef523c919b69cafb2ed17376c

    • SHA256

      ee9672a36f325585613b7b945d00e621451cc22385b7a3a4d8d5d2335da90c51

    • SHA512

      9c3b6017c72096e779e23cee2842d0d3c0b31603cb215d038d70550e9b530ce91d7728b94a34a980ba486db83194c8ca295b47875e0cbd020ca3b32c20aa56db

    • SSDEEP

      98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6h9eotaLapI9:VWyZ/K0ttYVAATt6Z6SogcI9

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks