General

  • Target

    b022e457994b349d5de8400c0f1c4bf0_NeikiAnalytics

  • Size

    86KB

  • Sample

    240516-g5785agb46

  • MD5

    b022e457994b349d5de8400c0f1c4bf0

  • SHA1

    d9fe42d92a853cff225a84ae4c29740d9f0ad40c

  • SHA256

    3fb10083391b7670d181cd9c267d65080d51b408cbb516eb918d8d05cf255bd1

  • SHA512

    76e25eeb81801add2ef26d0ff778347dfcc8d4fc6986145284bd975499f0f846dc3707a99f508b00d36872f76b89455ff548e8e906b0ce1c078eed1d93c229d7

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3e1:ymb3NkkiQ3mdBjF+3TU2K3bJZX+

Malware Config

Targets

    • Target

      b022e457994b349d5de8400c0f1c4bf0_NeikiAnalytics

    • Size

      86KB

    • MD5

      b022e457994b349d5de8400c0f1c4bf0

    • SHA1

      d9fe42d92a853cff225a84ae4c29740d9f0ad40c

    • SHA256

      3fb10083391b7670d181cd9c267d65080d51b408cbb516eb918d8d05cf255bd1

    • SHA512

      76e25eeb81801add2ef26d0ff778347dfcc8d4fc6986145284bd975499f0f846dc3707a99f508b00d36872f76b89455ff548e8e906b0ce1c078eed1d93c229d7

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3e1:ymb3NkkiQ3mdBjF+3TU2K3bJZX+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks