General

  • Target

    3f6ec96a5e69041ef802694945864797b544c926f8d3d2272af46b7d45e358ed_NeikiAnalytics.exe

  • Size

    236KB

  • Sample

    240701-h8xr8syhjd

  • MD5

    e590820e98907480ca4366a6451cb720

  • SHA1

    9eb3a4e73355a796ce2e8402758b3c170aa00838

  • SHA256

    3f6ec96a5e69041ef802694945864797b544c926f8d3d2272af46b7d45e358ed

  • SHA512

    f812cccc232e8da85cf9789f585f6d2379fd45a6dd34f612df27682050aaee0d7fe529dcb2135eefe3d69c84ccd094750d4ece77d120e77da24527f7284cde96

  • SSDEEP

    6144:LPKwmBwdEOI+oR6ZmPzCd/gy+AYtCtdWY5PAaePJLlLTmLPCfM:LiwmBgEOI+w6mrCd/gy+1C3Wm

Malware Config

Targets

    • Target

      3f6ec96a5e69041ef802694945864797b544c926f8d3d2272af46b7d45e358ed_NeikiAnalytics.exe

    • Size

      236KB

    • MD5

      e590820e98907480ca4366a6451cb720

    • SHA1

      9eb3a4e73355a796ce2e8402758b3c170aa00838

    • SHA256

      3f6ec96a5e69041ef802694945864797b544c926f8d3d2272af46b7d45e358ed

    • SHA512

      f812cccc232e8da85cf9789f585f6d2379fd45a6dd34f612df27682050aaee0d7fe529dcb2135eefe3d69c84ccd094750d4ece77d120e77da24527f7284cde96

    • SSDEEP

      6144:LPKwmBwdEOI+oR6ZmPzCd/gy+AYtCtdWY5PAaePJLlLTmLPCfM:LiwmBgEOI+w6mrCd/gy+1C3Wm

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks