General

  • Target

    b57345d1bce4f050c35acb23bcf69df0_NeikiAnalytics.exe

  • Size

    366KB

  • Sample

    240614-ls5dxsygkm

  • MD5

    b57345d1bce4f050c35acb23bcf69df0

  • SHA1

    507e3eea21961d9c2ac4d40957a78251414af97f

  • SHA256

    4916eb9eca9e0fc684bbaa263a485cb950064f964c6ddf2bb47617e0e0ce1707

  • SHA512

    719ad71bc2754c63f31ff43dd1080b40b37d25bd8b4d9dd215cf89d6469200ba0d2f1d6e158963dda2f721823da85526393f14ac01aff6e3f5a1c436c2e6bc01

  • SSDEEP

    6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1/:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1/

Score
10/10

Malware Config

Targets

    • Target

      b57345d1bce4f050c35acb23bcf69df0_NeikiAnalytics.exe

    • Size

      366KB

    • MD5

      b57345d1bce4f050c35acb23bcf69df0

    • SHA1

      507e3eea21961d9c2ac4d40957a78251414af97f

    • SHA256

      4916eb9eca9e0fc684bbaa263a485cb950064f964c6ddf2bb47617e0e0ce1707

    • SHA512

      719ad71bc2754c63f31ff43dd1080b40b37d25bd8b4d9dd215cf89d6469200ba0d2f1d6e158963dda2f721823da85526393f14ac01aff6e3f5a1c436c2e6bc01

    • SSDEEP

      6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1/:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1/

    Score
    10/10
    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks