General

  • Target

    211fdfa0c83483cf93bdc96aa7babdd0_NeikiAnalytics

  • Size

    457KB

  • Sample

    240513-1jffrsfd33

  • MD5

    211fdfa0c83483cf93bdc96aa7babdd0

  • SHA1

    dd556a7911e3e16c203aa3a72eb895073d403f57

  • SHA256

    75490944d21db57835c022f685420f79cacc632f0617540dd45dc6539237a8d8

  • SHA512

    db932474ba8a1aca04d92d46602ef17eb9530981fd7f0da5a18057639807821616158157c784ee31fc538ede24f75fb171e1261183d9a9c89da59a16def3f91d

  • SSDEEP

    12288:n3C9uDIPh2kkkkK4kXkkkkkkkkl888888888888888888nQR:ShPh2kkkkK4kXkkkkkkkkSR

Malware Config

Targets

    • Target

      211fdfa0c83483cf93bdc96aa7babdd0_NeikiAnalytics

    • Size

      457KB

    • MD5

      211fdfa0c83483cf93bdc96aa7babdd0

    • SHA1

      dd556a7911e3e16c203aa3a72eb895073d403f57

    • SHA256

      75490944d21db57835c022f685420f79cacc632f0617540dd45dc6539237a8d8

    • SHA512

      db932474ba8a1aca04d92d46602ef17eb9530981fd7f0da5a18057639807821616158157c784ee31fc538ede24f75fb171e1261183d9a9c89da59a16def3f91d

    • SSDEEP

      12288:n3C9uDIPh2kkkkK4kXkkkkkkkkl888888888888888888nQR:ShPh2kkkkK4kXkkkkkkkkSR

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks