General

  • Target

    2025-04-02_95e69746d07d1712ddedb567f57cdc1b_icedid_rhadamanthys_xmrig

  • Size

    7.5MB

  • Sample

    250402-el34ys1sgy

  • MD5

    95e69746d07d1712ddedb567f57cdc1b

  • SHA1

    ba92dd5349a802e25fdb84686605bccf4f306889

  • SHA256

    4df16748638f71db80cfcd4d6dcf2ded521dee4724e7c36e816ee966b43dd824

  • SHA512

    260d38a093d89083f9985121ce5596147288924079c60d8061e22a178741bc70c1fe57525e7cb20000a79e2a75e7cb63fe64aef99f1f415f8ceceb853a9100d7

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgRJL/aSlVah77GBfW455IRx55G2BSUXfcrRk0kq4Dp:da9+6Y7SOEibgRIGBfWI5IRhar23p

Malware Config

Targets

    • Target

      2025-04-02_95e69746d07d1712ddedb567f57cdc1b_icedid_rhadamanthys_xmrig

    • Size

      7.5MB

    • MD5

      95e69746d07d1712ddedb567f57cdc1b

    • SHA1

      ba92dd5349a802e25fdb84686605bccf4f306889

    • SHA256

      4df16748638f71db80cfcd4d6dcf2ded521dee4724e7c36e816ee966b43dd824

    • SHA512

      260d38a093d89083f9985121ce5596147288924079c60d8061e22a178741bc70c1fe57525e7cb20000a79e2a75e7cb63fe64aef99f1f415f8ceceb853a9100d7

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgRJL/aSlVah77GBfW455IRx55G2BSUXfcrRk0kq4Dp:da9+6Y7SOEibgRIGBfWI5IRhar23p

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks