General

  • Target

    e9a73a7234d05d176e7d74dad477f250_NeikiAnalytics

  • Size

    91KB

  • Sample

    240509-y2c29afe85

  • MD5

    e9a73a7234d05d176e7d74dad477f250

  • SHA1

    dcff0a4e5b1f2e84d4f17b70ca52dba7a88a9543

  • SHA256

    80c192638732b46615fe7e53cf17c9327dd9df9b6bc7cc0a4500b44d2390dedc

  • SHA512

    8a944a532780f7834e04e805c89b352421acacf263183889c35b6abec25a6e295cacb041ff3df30d1b748db3a09bef5ebb4be462938d34ec0996b1239b00366a

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRBt:ymb3NkkiQ3mdBjFIVLd2hWZGreRCUlb1

Malware Config

Targets

    • Target

      e9a73a7234d05d176e7d74dad477f250_NeikiAnalytics

    • Size

      91KB

    • MD5

      e9a73a7234d05d176e7d74dad477f250

    • SHA1

      dcff0a4e5b1f2e84d4f17b70ca52dba7a88a9543

    • SHA256

      80c192638732b46615fe7e53cf17c9327dd9df9b6bc7cc0a4500b44d2390dedc

    • SHA512

      8a944a532780f7834e04e805c89b352421acacf263183889c35b6abec25a6e295cacb041ff3df30d1b748db3a09bef5ebb4be462938d34ec0996b1239b00366a

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRBt:ymb3NkkiQ3mdBjFIVLd2hWZGreRCUlb1

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks