General

  • Target

    819a1d8f31f435c3d499eaee7c149e00_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240511-fhms8sgh98

  • MD5

    819a1d8f31f435c3d499eaee7c149e00

  • SHA1

    e6cc7130bfab4495be1dd039207e314e472b5209

  • SHA256

    4cd1aa47b9e1def72b3a167d248a55984fd94830ace98faac8b565a67170c8a4

  • SHA512

    4d3b8d7e0e989e5f1183b08a609a275dc35d45eb6846b31f8adab8420d609c2aed8b49dff61c56988dcd3e72a0ecb50b2fe7a9db3e579be3ac8ac74e178a19be

  • SSDEEP

    24576:7iBygZsKLNm3HkxltQV8/w6TZwxCQ3kt9jbHCaStjl+5HWxN:7iYgiAmOHYew6TKAQatbiaSP/n

Malware Config

Targets

    • Target

      819a1d8f31f435c3d499eaee7c149e00_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      819a1d8f31f435c3d499eaee7c149e00

    • SHA1

      e6cc7130bfab4495be1dd039207e314e472b5209

    • SHA256

      4cd1aa47b9e1def72b3a167d248a55984fd94830ace98faac8b565a67170c8a4

    • SHA512

      4d3b8d7e0e989e5f1183b08a609a275dc35d45eb6846b31f8adab8420d609c2aed8b49dff61c56988dcd3e72a0ecb50b2fe7a9db3e579be3ac8ac74e178a19be

    • SSDEEP

      24576:7iBygZsKLNm3HkxltQV8/w6TZwxCQ3kt9jbHCaStjl+5HWxN:7iYgiAmOHYew6TKAQatbiaSP/n

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks