General

  • Target

    3ff298c595aff6c51b40ff7e0704b620_NeikiAnalytics

  • Size

    414KB

  • Sample

    240510-b455gseg68

  • MD5

    3ff298c595aff6c51b40ff7e0704b620

  • SHA1

    194d6dd6ac350cb082e6e9d361e65bc12a7ede7f

  • SHA256

    e23d1acf650eb13666a4c98c2a7fbd869e718928672f23e2d5c21ba5993befb9

  • SHA512

    eecc2e40295caab0bd690b79980a579097c0ec159c7a688ec13f3670f1f231b12115819f4accec8a9a8f4148062d2e3f60887fb44692dcd54d74e9e01d70896d

  • SSDEEP

    12288:n3C9ytvngQj4DtvnV9wLn9UTfC8eieJNBNIsYPU:SgdnJUdnV90

Malware Config

Targets

    • Target

      3ff298c595aff6c51b40ff7e0704b620_NeikiAnalytics

    • Size

      414KB

    • MD5

      3ff298c595aff6c51b40ff7e0704b620

    • SHA1

      194d6dd6ac350cb082e6e9d361e65bc12a7ede7f

    • SHA256

      e23d1acf650eb13666a4c98c2a7fbd869e718928672f23e2d5c21ba5993befb9

    • SHA512

      eecc2e40295caab0bd690b79980a579097c0ec159c7a688ec13f3670f1f231b12115819f4accec8a9a8f4148062d2e3f60887fb44692dcd54d74e9e01d70896d

    • SSDEEP

      12288:n3C9ytvngQj4DtvnV9wLn9UTfC8eieJNBNIsYPU:SgdnJUdnV90

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks