General

  • Target

    56a4f31a8c34ffa898df2ef0a3eb7d70_NeikiAnalytics.exe

  • Size

    92KB

  • Sample

    240517-3v6hfahf4y

  • MD5

    56a4f31a8c34ffa898df2ef0a3eb7d70

  • SHA1

    2df809b877bc549c0897a0c8642d5e15e3fafb18

  • SHA256

    c64c7f15284ee6ddf3570587abd8d608d45e2e06b5e337002d0dd92055f04c6f

  • SHA512

    f270fb026506b1da7f1666830f731f952e297923c7bd77d856209df74d319547ecddd26daa2fb9f6239af6914e8633e8e6bebb7cb05757f5d5df03ed380acfe1

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpWm:8hOmTsF93UYfwC6GIout0fmCiiiXA6mN

Malware Config

Targets

    • Target

      56a4f31a8c34ffa898df2ef0a3eb7d70_NeikiAnalytics.exe

    • Size

      92KB

    • MD5

      56a4f31a8c34ffa898df2ef0a3eb7d70

    • SHA1

      2df809b877bc549c0897a0c8642d5e15e3fafb18

    • SHA256

      c64c7f15284ee6ddf3570587abd8d608d45e2e06b5e337002d0dd92055f04c6f

    • SHA512

      f270fb026506b1da7f1666830f731f952e297923c7bd77d856209df74d319547ecddd26daa2fb9f6239af6914e8633e8e6bebb7cb05757f5d5df03ed380acfe1

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpWm:8hOmTsF93UYfwC6GIout0fmCiiiXA6mN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks