General

  • Target

    9fbb8fd31d464f470956255cdc24d0d0_NeikiAnalytics.exe

  • Size

    376KB

  • Sample

    240517-ef76qagd59

  • MD5

    9fbb8fd31d464f470956255cdc24d0d0

  • SHA1

    7ebe0666cad8bfb2e1887399c24448ac83d36cb3

  • SHA256

    4716480f8e848e11bf570760256807b15439c9055feb22dc74f36e6d358713c0

  • SHA512

    822f28e9241070b66f476670a7e91e1e7da6c71638272bd328c06afc9fe4a91b5d50879ea2f6e7c6cba68d1f90002092d533ba490aafb1f03aa8a6727a49e426

  • SSDEEP

    6144:9cm4FmowdHoSABIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7D:/4wFHoSA4KofHfHTXQLzgvnzHPowYbvW

Malware Config

Targets

    • Target

      9fbb8fd31d464f470956255cdc24d0d0_NeikiAnalytics.exe

    • Size

      376KB

    • MD5

      9fbb8fd31d464f470956255cdc24d0d0

    • SHA1

      7ebe0666cad8bfb2e1887399c24448ac83d36cb3

    • SHA256

      4716480f8e848e11bf570760256807b15439c9055feb22dc74f36e6d358713c0

    • SHA512

      822f28e9241070b66f476670a7e91e1e7da6c71638272bd328c06afc9fe4a91b5d50879ea2f6e7c6cba68d1f90002092d533ba490aafb1f03aa8a6727a49e426

    • SSDEEP

      6144:9cm4FmowdHoSABIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7D:/4wFHoSA4KofHfHTXQLzgvnzHPowYbvW

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks