General

  • Target

    316e3c88e58e042dc7446b86ba37fb80_NeikiAnalytics

  • Size

    77KB

  • Sample

    240510-3vae1agh7z

  • MD5

    316e3c88e58e042dc7446b86ba37fb80

  • SHA1

    95499f03f0f4a53f299e229e63ff46fdbf3fd5da

  • SHA256

    ea12e3887e7167b5cbd555c22fd96407493e63a2f3942f1f7b0d4cf8095d4aaf

  • SHA512

    a08d28bbe9df29517cb914a849011c4a2a67135f27f1334d265892688e4b0620b8531af1d1c7eb1e5552b5501fa5c346254b45aa92af7ee2c92f44c29f5343e8

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAX8YieVIJclPvPJtcdc0:ymb3NkkiQ3mdBjFo68YBVIJc9Jtx0

Malware Config

Targets

    • Target

      316e3c88e58e042dc7446b86ba37fb80_NeikiAnalytics

    • Size

      77KB

    • MD5

      316e3c88e58e042dc7446b86ba37fb80

    • SHA1

      95499f03f0f4a53f299e229e63ff46fdbf3fd5da

    • SHA256

      ea12e3887e7167b5cbd555c22fd96407493e63a2f3942f1f7b0d4cf8095d4aaf

    • SHA512

      a08d28bbe9df29517cb914a849011c4a2a67135f27f1334d265892688e4b0620b8531af1d1c7eb1e5552b5501fa5c346254b45aa92af7ee2c92f44c29f5343e8

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAX8YieVIJclPvPJtcdc0:ymb3NkkiQ3mdBjFo68YBVIJc9Jtx0

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks