General

  • Target

    2025-04-22_1eefaaeef37d46a395fdba0674aecbd2_amadey_black-basta_elex_hijackloader_icedid_luca-stealer_rhadamanthys_smoke-loader_xiaobaminer

  • Size

    7.6MB

  • Sample

    250422-gdm4wazkz9

  • MD5

    1eefaaeef37d46a395fdba0674aecbd2

  • SHA1

    3e57135db3bf61b090618472d7acc2f79f431429

  • SHA256

    5cb1a2a5f0ae8081e48f7ffcb52708eb3e2b7a800242479dea55db72b4e3f320

  • SHA512

    79c9f41a76e1fffd09b7cb95d830d9d52365dbb4b94569e96fc8f70ddfacfe91048273cbda3f71710c67223b9f959c3f0dcd94ea306ed11957cbbb443984e8ff

  • SSDEEP

    98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6dXJdWGw6VdIky/Cr4QUKRuy5aOd:VWyZ/K0ttYVAATt6Z6XUkfy/CMNq5

Malware Config

Targets

    • Target

      2025-04-22_1eefaaeef37d46a395fdba0674aecbd2_amadey_black-basta_elex_hijackloader_icedid_luca-stealer_rhadamanthys_smoke-loader_xiaobaminer

    • Size

      7.6MB

    • MD5

      1eefaaeef37d46a395fdba0674aecbd2

    • SHA1

      3e57135db3bf61b090618472d7acc2f79f431429

    • SHA256

      5cb1a2a5f0ae8081e48f7ffcb52708eb3e2b7a800242479dea55db72b4e3f320

    • SHA512

      79c9f41a76e1fffd09b7cb95d830d9d52365dbb4b94569e96fc8f70ddfacfe91048273cbda3f71710c67223b9f959c3f0dcd94ea306ed11957cbbb443984e8ff

    • SSDEEP

      98304:/AmgGWQtZ/K0tGOFWVRuLftCTt6Z6dXJdWGw6VdIky/Cr4QUKRuy5aOd:VWyZ/K0ttYVAATt6Z6XUkfy/CMNq5

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks