General

  • Target

    2025-04-02_9dc7f129c6fc5d3fc7048496f899da93_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    6.2MB

  • Sample

    250402-dg9khazxds

  • MD5

    9dc7f129c6fc5d3fc7048496f899da93

  • SHA1

    12953c51f5745f1f22f58930b8ebfcc72aa403fe

  • SHA256

    e11cd55d69383e4d0f5f0f2667c5c7e67ebd11f6055347d507b17c3a1cace848

  • SHA512

    dbc1dc7c1b0ede8e09106742365d7a41134c0e86e1507c7ec0cff9ba529fd4892368c7e81559a5a3efd88e769dbd0ec16b590c06fd8e92dde7147f2dc02c3379

  • SSDEEP

    49152:7iYgiAmOHYew6TKAQatzuvFS/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7G4:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6D

Malware Config

Targets

    • Target

      2025-04-02_9dc7f129c6fc5d3fc7048496f899da93_amadey_black-basta_hijackloader_icedid_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      6.2MB

    • MD5

      9dc7f129c6fc5d3fc7048496f899da93

    • SHA1

      12953c51f5745f1f22f58930b8ebfcc72aa403fe

    • SHA256

      e11cd55d69383e4d0f5f0f2667c5c7e67ebd11f6055347d507b17c3a1cace848

    • SHA512

      dbc1dc7c1b0ede8e09106742365d7a41134c0e86e1507c7ec0cff9ba529fd4892368c7e81559a5a3efd88e769dbd0ec16b590c06fd8e92dde7147f2dc02c3379

    • SSDEEP

      49152:7iYgiAmOHYew6TKAQatzuvFS/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7G4:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6D

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks