General

  • Target

    b14f19e2f1440bd375539b079c72be80_NEIKI

  • Size

    202KB

  • Sample

    240509-a4snqabc88

  • MD5

    b14f19e2f1440bd375539b079c72be80

  • SHA1

    a40426e7eed3d61fbafd69359c4d8cf56bb88629

  • SHA256

    031083a3b33cd229213ca34743dee747d0ff9e14bca839dfcd5d2e60b4644b17

  • SHA512

    7d73e51122ac86759389e74e0eeaba91aa9f3dd3f4bf4d9c369c95acbca1c52c061766142379a71c21d9a0889413e64044ac93166fbe4eb358106366d293c235

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUmb:n3C9BRIG0asYFm71m8+GdkB9P

Malware Config

Targets

    • Target

      b14f19e2f1440bd375539b079c72be80_NEIKI

    • Size

      202KB

    • MD5

      b14f19e2f1440bd375539b079c72be80

    • SHA1

      a40426e7eed3d61fbafd69359c4d8cf56bb88629

    • SHA256

      031083a3b33cd229213ca34743dee747d0ff9e14bca839dfcd5d2e60b4644b17

    • SHA512

      7d73e51122ac86759389e74e0eeaba91aa9f3dd3f4bf4d9c369c95acbca1c52c061766142379a71c21d9a0889413e64044ac93166fbe4eb358106366d293c235

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUmb:n3C9BRIG0asYFm71m8+GdkB9P

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks