General

  • Target

    20da9187768522a11e7c3c55bc020390_NeikiAnalytics.exe

  • Size

    81KB

  • Sample

    240516-ygd4tadc2y

  • MD5

    20da9187768522a11e7c3c55bc020390

  • SHA1

    ef0342e8f0258f17cd3fe016b16d9eefafd69e1d

  • SHA256

    91130a9eb1f1cfb3323eb968e97b7929f913549baa13aa2ffc475e9c9843fdff

  • SHA512

    6a9f5d9f80e6e78c8900469ba74d740d9fe1b00b3eb2e98b5523d3ecef249f518be0ab13d043c26a99e3cf1dc969ae9f82b82515d6b7aec955d59959dfc6b45b

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JkZPsvF:ymb3NkkiQ3mdBjFIWeFGyA9PA

Malware Config

Targets

    • Target

      20da9187768522a11e7c3c55bc020390_NeikiAnalytics.exe

    • Size

      81KB

    • MD5

      20da9187768522a11e7c3c55bc020390

    • SHA1

      ef0342e8f0258f17cd3fe016b16d9eefafd69e1d

    • SHA256

      91130a9eb1f1cfb3323eb968e97b7929f913549baa13aa2ffc475e9c9843fdff

    • SHA512

      6a9f5d9f80e6e78c8900469ba74d740d9fe1b00b3eb2e98b5523d3ecef249f518be0ab13d043c26a99e3cf1dc969ae9f82b82515d6b7aec955d59959dfc6b45b

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JkZPsvF:ymb3NkkiQ3mdBjFIWeFGyA9PA

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks