General

  • Target

    e3000c3bc8bbfcfb55805798941c7740_NeikiAnalytics.exe

  • Size

    55KB

  • Sample

    240517-kt6spsad2t

  • MD5

    e3000c3bc8bbfcfb55805798941c7740

  • SHA1

    f940b211506f5544ff4596b4d26bc072514a5d2c

  • SHA256

    4376142565c00224235cd3b0bb957096e6bd87c393a106f0056d187678f22ced

  • SHA512

    23e9f11a69a456f26be6a4831ccf79168558f3e2e45cf8455ae1553f56450ee407baf5b48efb35be27b96f2d1420ac22d5f6da3e1f1a1f31570c1730ed21694c

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFt:ymb3NkkiQ3mdBjFIFt

Malware Config

Targets

    • Target

      e3000c3bc8bbfcfb55805798941c7740_NeikiAnalytics.exe

    • Size

      55KB

    • MD5

      e3000c3bc8bbfcfb55805798941c7740

    • SHA1

      f940b211506f5544ff4596b4d26bc072514a5d2c

    • SHA256

      4376142565c00224235cd3b0bb957096e6bd87c393a106f0056d187678f22ced

    • SHA512

      23e9f11a69a456f26be6a4831ccf79168558f3e2e45cf8455ae1553f56450ee407baf5b48efb35be27b96f2d1420ac22d5f6da3e1f1a1f31570c1730ed21694c

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFt:ymb3NkkiQ3mdBjFIFt

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks