General

  • Target

    d43f1c21faf905310e41323abada7d40_NeikiAnalytics

  • Size

    71KB

  • Sample

    240515-qsa8asbf3v

  • MD5

    d43f1c21faf905310e41323abada7d40

  • SHA1

    d530d1e88b587648cf869afc1720a2750117c652

  • SHA256

    2e4342cdf60ae1af937823d6344dc376ee95657308f31f8df0513275604f6e40

  • SHA512

    118ed2b557624aec3baf92656f29d7f36346cb812380bb7b618660f107142dd2e902ee539816b7b45609ae08b3ad9e55f2082e05c8b539100a4a62ddfb5df09d

  • SSDEEP

    1536:kvQBeOGtrYS3srx93UBWfwC6Ggnouy8p5yAXNYLIALUmYi:khOmTsF93UYfwC6GIoutpY4ALUmN

Malware Config

Targets

    • Target

      d43f1c21faf905310e41323abada7d40_NeikiAnalytics

    • Size

      71KB

    • MD5

      d43f1c21faf905310e41323abada7d40

    • SHA1

      d530d1e88b587648cf869afc1720a2750117c652

    • SHA256

      2e4342cdf60ae1af937823d6344dc376ee95657308f31f8df0513275604f6e40

    • SHA512

      118ed2b557624aec3baf92656f29d7f36346cb812380bb7b618660f107142dd2e902ee539816b7b45609ae08b3ad9e55f2082e05c8b539100a4a62ddfb5df09d

    • SSDEEP

      1536:kvQBeOGtrYS3srx93UBWfwC6Ggnouy8p5yAXNYLIALUmYi:khOmTsF93UYfwC6GIoutpY4ALUmN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks