General

  • Target

    2025-04-02_86cc48bf05a1ad4967560750140b27fa_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    7.7MB

  • Sample

    250402-cpdmcszsdy

  • MD5

    86cc48bf05a1ad4967560750140b27fa

  • SHA1

    7ba73675747b43e1f8d3b450169ad116cb96f2f7

  • SHA256

    e7fcc4160882e4baf4c8ca39d1e56828bf6979a14d78a4839bbd319d71b2787f

  • SHA512

    767265c78cd0544edee45c899d2f6f80163a4f61b55a396db9ed94e5c5e11ba3f726c288e495704de23204e4ae02e48170ea49f75dac24c48903fb3f849ffc4d

  • SSDEEP

    98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z61W1PszE/nbXaPK:VWyZ/K0ttYVAATt6Z64xsADXJ

Malware Config

Targets

    • Target

      2025-04-02_86cc48bf05a1ad4967560750140b27fa_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      7.7MB

    • MD5

      86cc48bf05a1ad4967560750140b27fa

    • SHA1

      7ba73675747b43e1f8d3b450169ad116cb96f2f7

    • SHA256

      e7fcc4160882e4baf4c8ca39d1e56828bf6979a14d78a4839bbd319d71b2787f

    • SHA512

      767265c78cd0544edee45c899d2f6f80163a4f61b55a396db9ed94e5c5e11ba3f726c288e495704de23204e4ae02e48170ea49f75dac24c48903fb3f849ffc4d

    • SSDEEP

      98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z61W1PszE/nbXaPK:VWyZ/K0ttYVAATt6Z64xsADXJ

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks