General

  • Target

    0767e132895a5780cc0a71e762f43620_NeikiAnalytics.exe

  • Size

    200KB

  • Sample

    240518-1ext9agg7y

  • MD5

    0767e132895a5780cc0a71e762f43620

  • SHA1

    55c85a65523ed960137a122570a6221636e5e34b

  • SHA256

    ac312048d5f4496c695b8491c402912ee92709c11b99ac8db014a1b0375f78e4

  • SHA512

    753296d52adf2854932ec31ffa66d119fc68b22dfc0b093c6b1052cc9bf3eb8f28af4f62eeb5dccc0edf206670473e62d6be662e48dc4d2d183311bb084b784c

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUt6iQ:n3C9BRIG0asYFm71m8+GdkB99

Malware Config

Targets

    • Target

      0767e132895a5780cc0a71e762f43620_NeikiAnalytics.exe

    • Size

      200KB

    • MD5

      0767e132895a5780cc0a71e762f43620

    • SHA1

      55c85a65523ed960137a122570a6221636e5e34b

    • SHA256

      ac312048d5f4496c695b8491c402912ee92709c11b99ac8db014a1b0375f78e4

    • SHA512

      753296d52adf2854932ec31ffa66d119fc68b22dfc0b093c6b1052cc9bf3eb8f28af4f62eeb5dccc0edf206670473e62d6be662e48dc4d2d183311bb084b784c

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUt6iQ:n3C9BRIG0asYFm71m8+GdkB99

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks