General

  • Target

    2025-04-22_a10d1d3e7efd1e27fdac52d07fd276b7_black-basta_elex_hijackloader_icedid_rhadamanthys_xiaobaminer

  • Size

    4.8MB

  • Sample

    250422-e1wcnaxp12

  • MD5

    a10d1d3e7efd1e27fdac52d07fd276b7

  • SHA1

    dc1ff742b47b3b6eddb0b2798939cfccccce2fc2

  • SHA256

    406cb8ea2fdebf1cbacc7cdf2abd6fdead08da88450e93841af92e9214e0abeb

  • SHA512

    e756a6aa8a24d1f908743f80023657d8b4666b40f2a1aae5291686405c7d82782f6a666d219908bf1f90809dac1766faf79a9350be3e43f414d976db07ffda2e

  • SSDEEP

    49152:9bYhCnzcErdabSF/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7G6XSq4vFWV2:yhWQtZ/K0tGOFWVRuLftCT

Malware Config

Targets

    • Target

      2025-04-22_a10d1d3e7efd1e27fdac52d07fd276b7_black-basta_elex_hijackloader_icedid_rhadamanthys_xiaobaminer

    • Size

      4.8MB

    • MD5

      a10d1d3e7efd1e27fdac52d07fd276b7

    • SHA1

      dc1ff742b47b3b6eddb0b2798939cfccccce2fc2

    • SHA256

      406cb8ea2fdebf1cbacc7cdf2abd6fdead08da88450e93841af92e9214e0abeb

    • SHA512

      e756a6aa8a24d1f908743f80023657d8b4666b40f2a1aae5291686405c7d82782f6a666d219908bf1f90809dac1766faf79a9350be3e43f414d976db07ffda2e

    • SSDEEP

      49152:9bYhCnzcErdabSF/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7G6XSq4vFWV2:yhWQtZ/K0tGOFWVRuLftCT

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks