General

  • Target

    370f737a254c94fdb1a72175e0a36610_NeikiAnalytics.exe

  • Size

    169KB

  • Sample

    240522-zh2f6sga53

  • MD5

    370f737a254c94fdb1a72175e0a36610

  • SHA1

    f0f3abc88d55243d4f335d099cffbd86fe62386f

  • SHA256

    51a6a8ed7a57f71d1578876e4d3451eff9d3dfe9e283a2843ea836ae46b7acd4

  • SHA512

    effb3194f60ef932c4f7af82ed7f71ac8ec67ff63ee931db867525468fc741787fad174a91f6b913fb00e0e39cfc545ca931e724afa43cbc500d28ae42d13c36

  • SSDEEP

    1536:HvQBeOGtrYS3srx93UBWfwC6Ggnouy8CUYj7FK4O8A1o4XEc3YtxD8/Ai2R:HhOmTsF93UYfwC6GIoutX8Ki3c3YT8Vc

Malware Config

Targets

    • Target

      370f737a254c94fdb1a72175e0a36610_NeikiAnalytics.exe

    • Size

      169KB

    • MD5

      370f737a254c94fdb1a72175e0a36610

    • SHA1

      f0f3abc88d55243d4f335d099cffbd86fe62386f

    • SHA256

      51a6a8ed7a57f71d1578876e4d3451eff9d3dfe9e283a2843ea836ae46b7acd4

    • SHA512

      effb3194f60ef932c4f7af82ed7f71ac8ec67ff63ee931db867525468fc741787fad174a91f6b913fb00e0e39cfc545ca931e724afa43cbc500d28ae42d13c36

    • SSDEEP

      1536:HvQBeOGtrYS3srx93UBWfwC6Ggnouy8CUYj7FK4O8A1o4XEc3YtxD8/Ai2R:HhOmTsF93UYfwC6GIoutX8Ki3c3YT8Vc

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks