General

  • Target

    4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe

  • Size

    436KB

  • Sample

    240701-m2x7msxfje

  • MD5

    454b29b125477c8534af5c43a70c2430

  • SHA1

    69c78b3a178da54f4a0137311bd1d550e0e8587e

  • SHA256

    4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b

  • SHA512

    2b53219f886641cd17cbd9331bae0522d82910a1e8b7833b4950d45aa635353ec9c984456e199228fcff626d0a4e7c0ad7e02a5205bdf3183ca429f07bc2f4b6

  • SSDEEP

    6144:dGdR+Yk/N8duBmG6t+UnRsRCQ/OJZOg70:doR+Y4NSG6oUnRsdOJZOg70

Score
10/10

Malware Config

Targets

    • Target

      4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe

    • Size

      436KB

    • MD5

      454b29b125477c8534af5c43a70c2430

    • SHA1

      69c78b3a178da54f4a0137311bd1d550e0e8587e

    • SHA256

      4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b

    • SHA512

      2b53219f886641cd17cbd9331bae0522d82910a1e8b7833b4950d45aa635353ec9c984456e199228fcff626d0a4e7c0ad7e02a5205bdf3183ca429f07bc2f4b6

    • SSDEEP

      6144:dGdR+Yk/N8duBmG6t+UnRsRCQ/OJZOg70:doR+Y4NSG6oUnRsdOJZOg70

    Score
    10/10
    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks