General

  • Target

    7f434b431e89b8ecac1176379a78abd0_NeikiAnalytics

  • Size

    145KB

  • Sample

    240516-cvm3zsge56

  • MD5

    7f434b431e89b8ecac1176379a78abd0

  • SHA1

    1df15181f3de4979f9ac54682d3f88583dc8a078

  • SHA256

    6a05593454675174bf1868f1cd715305f47d3ad77af307b6f007240132f73f4a

  • SHA512

    ba21a2dd9e6c4b2893631dd113fe5bc73be2d4c0d4c8e7af15ce968e6dac773442731240c3a0d03e63503fbe11d08ed7a219e2fd8a87dbb76b4ea27ca2029634

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQI:n3C9BRosxW8MFHLMW7QI

Malware Config

Targets

    • Target

      7f434b431e89b8ecac1176379a78abd0_NeikiAnalytics

    • Size

      145KB

    • MD5

      7f434b431e89b8ecac1176379a78abd0

    • SHA1

      1df15181f3de4979f9ac54682d3f88583dc8a078

    • SHA256

      6a05593454675174bf1868f1cd715305f47d3ad77af307b6f007240132f73f4a

    • SHA512

      ba21a2dd9e6c4b2893631dd113fe5bc73be2d4c0d4c8e7af15ce968e6dac773442731240c3a0d03e63503fbe11d08ed7a219e2fd8a87dbb76b4ea27ca2029634

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQI:n3C9BRosxW8MFHLMW7QI

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks