General

  • Target

    158e24d9ff6ec04e7dda9c8df34c7380_NeikiAnalytics.exe

  • Size

    184KB

  • Sample

    240518-2jyg1sca93

  • MD5

    158e24d9ff6ec04e7dda9c8df34c7380

  • SHA1

    a0bdb8fa08ab98079a5fb85784b224db2d1dad43

  • SHA256

    ecdcac6af4d0f8970857e08d7316ee83271edbd3c0bacd687648fe84c22a9bf3

  • SHA512

    2295cdfeb057839ceee7894bb953a4977c63c7a2964a36f345cc5b24169a869242224572cf3b1600b5574faec1555b56b858778a3911cc54f76d64b5ebd02c1d

  • SSDEEP

    1536:PvQBeOGtrYSSsrc93UBIfdC67m6AJiqgT4+EMdbSf:PhOm2sI93UufdC67ciJTWMdbA

Malware Config

Targets

    • Target

      158e24d9ff6ec04e7dda9c8df34c7380_NeikiAnalytics.exe

    • Size

      184KB

    • MD5

      158e24d9ff6ec04e7dda9c8df34c7380

    • SHA1

      a0bdb8fa08ab98079a5fb85784b224db2d1dad43

    • SHA256

      ecdcac6af4d0f8970857e08d7316ee83271edbd3c0bacd687648fe84c22a9bf3

    • SHA512

      2295cdfeb057839ceee7894bb953a4977c63c7a2964a36f345cc5b24169a869242224572cf3b1600b5574faec1555b56b858778a3911cc54f76d64b5ebd02c1d

    • SSDEEP

      1536:PvQBeOGtrYSSsrc93UBIfdC67m6AJiqgT4+EMdbSf:PhOm2sI93UufdC67ciJTWMdbA

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks