General

  • Target

    d76caef928f4fa7d016bc20307422a90_NeikiAnalytics.exe

  • Size

    169KB

  • Sample

    240519-rt9mxsbg91

  • MD5

    d76caef928f4fa7d016bc20307422a90

  • SHA1

    b8f4916bce06a246d223637e93716058fbcafc7a

  • SHA256

    710ad4424f50f3202514b48546416bc3e7c8c619985eb778fbf0157281b79fb0

  • SHA512

    e75b7d41100b827f87ffb7255a6e4b77d6895e84e567c2d16d6a3ea162a95a3385e62b5d312dd7bc770a02dc03ee4d184cf54d5b84fe0a1ac6e0da4346e3ce18

  • SSDEEP

    1536:HvQBeOGtrYS3srx93UBWfwC6Ggnouy8CUYj7FK4O8A1o4XEc3YtxD8/Ai2A:HhOmTsF93UYfwC6GIoutX8Ki3c3YT8Vf

Malware Config

Targets

    • Target

      d76caef928f4fa7d016bc20307422a90_NeikiAnalytics.exe

    • Size

      169KB

    • MD5

      d76caef928f4fa7d016bc20307422a90

    • SHA1

      b8f4916bce06a246d223637e93716058fbcafc7a

    • SHA256

      710ad4424f50f3202514b48546416bc3e7c8c619985eb778fbf0157281b79fb0

    • SHA512

      e75b7d41100b827f87ffb7255a6e4b77d6895e84e567c2d16d6a3ea162a95a3385e62b5d312dd7bc770a02dc03ee4d184cf54d5b84fe0a1ac6e0da4346e3ce18

    • SSDEEP

      1536:HvQBeOGtrYS3srx93UBWfwC6Ggnouy8CUYj7FK4O8A1o4XEc3YtxD8/Ai2A:HhOmTsF93UYfwC6GIoutX8Ki3c3YT8Vf

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks