General

  • Target

    d9ecfe6c5330d772e5b5ddb790eb6830_NeikiAnalytics

  • Size

    93KB

  • Sample

    240516-l51aqsfh63

  • MD5

    d9ecfe6c5330d772e5b5ddb790eb6830

  • SHA1

    a46b6d954c69697faa3c962d56f4561e0396e716

  • SHA256

    2b67942fe655460dd0779bcac6129e9d8b03e81bdba023eb3f9bad6a67c6e3a4

  • SHA512

    29daa5b25b330b08b5ae1a04fa25034e922d6b54d80c1a68689f45c50f8995ffd1e4e88669894a1fb31b2303edaa7d1f718a96ee13ba22a11ecb4f0c71ed845a

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JxJAg8dtW:ymb3NkkiQ3mdBjFIWeFGyAsJAg2W

Malware Config

Targets

    • Target

      d9ecfe6c5330d772e5b5ddb790eb6830_NeikiAnalytics

    • Size

      93KB

    • MD5

      d9ecfe6c5330d772e5b5ddb790eb6830

    • SHA1

      a46b6d954c69697faa3c962d56f4561e0396e716

    • SHA256

      2b67942fe655460dd0779bcac6129e9d8b03e81bdba023eb3f9bad6a67c6e3a4

    • SHA512

      29daa5b25b330b08b5ae1a04fa25034e922d6b54d80c1a68689f45c50f8995ffd1e4e88669894a1fb31b2303edaa7d1f718a96ee13ba22a11ecb4f0c71ed845a

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JxJAg8dtW:ymb3NkkiQ3mdBjFIWeFGyAsJAg2W

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks