General

  • Target

    2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig

  • Size

    10.6MB

  • Sample

    250422-az3ywsyvgw

  • MD5

    0cc2edd1e91b0809faa0b307b605f67d

  • SHA1

    f668413bbfdedc77f887796c765213bed476c528

  • SHA256

    7302e1d836855c882f725727d8a519c7680ced1b960e845022057345b2255ecc

  • SHA512

    eba85534acb12c87f128a9dfd426a928edffcf53a18731557a7fdf1cc0889d845b3b71a1c5e03abc1161e1ec3df9ef01cdd6ff3ab1d85e5bd6d5746bc9778238

  • SSDEEP

    196608:da9+6Y7SOEibgRrwoFWyZ/K0ttYVAATsKmd0L:dFgRrwowyZ/K0ttYZT7qw

Malware Config

Targets

    • Target

      2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig

    • Size

      10.6MB

    • MD5

      0cc2edd1e91b0809faa0b307b605f67d

    • SHA1

      f668413bbfdedc77f887796c765213bed476c528

    • SHA256

      7302e1d836855c882f725727d8a519c7680ced1b960e845022057345b2255ecc

    • SHA512

      eba85534acb12c87f128a9dfd426a928edffcf53a18731557a7fdf1cc0889d845b3b71a1c5e03abc1161e1ec3df9ef01cdd6ff3ab1d85e5bd6d5746bc9778238

    • SSDEEP

      196608:da9+6Y7SOEibgRrwoFWyZ/K0ttYVAATsKmd0L:dFgRrwowyZ/K0ttYZT7qw

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks