General

  • Target

    503fe1810e76f8fd67748e997d1ea4e0_NeikiAnalytics

  • Size

    99KB

  • Sample

    240510-xz4azsga84

  • MD5

    503fe1810e76f8fd67748e997d1ea4e0

  • SHA1

    8c41b6c1595b2973cf48c5dcf0541ac5a10f8a30

  • SHA256

    18636bb08641944d12f4fdb958453529caf183f086604cd809acf4ddbe2e1e91

  • SHA512

    b771699ad07f62990f90593cac67e14c60f176d6166fe74e95ba86d5a3ff1b022f587649aa746128f5edb5d15969dd1789e2b61c48af111917906931c5aa2a57

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq/4B:n3C9BRo7tvnJ99T/KZE/a

Malware Config

Targets

    • Target

      503fe1810e76f8fd67748e997d1ea4e0_NeikiAnalytics

    • Size

      99KB

    • MD5

      503fe1810e76f8fd67748e997d1ea4e0

    • SHA1

      8c41b6c1595b2973cf48c5dcf0541ac5a10f8a30

    • SHA256

      18636bb08641944d12f4fdb958453529caf183f086604cd809acf4ddbe2e1e91

    • SHA512

      b771699ad07f62990f90593cac67e14c60f176d6166fe74e95ba86d5a3ff1b022f587649aa746128f5edb5d15969dd1789e2b61c48af111917906931c5aa2a57

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq/4B:n3C9BRo7tvnJ99T/KZE/a

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks