General

  • Target

    b470addcbe243d3d6ede171df2a3ce70_NeikiAnalytics.exe

  • Size

    64KB

  • Sample

    240518-j7q4qsbd49

  • MD5

    b470addcbe243d3d6ede171df2a3ce70

  • SHA1

    2425d5d04413ce1ee15a59e5283d0b30731e9d58

  • SHA256

    38efcabff123ffa1b11a0ee0cd4329d595d62091c04118e8b4862307a277009f

  • SHA512

    36ba262edfac71613b1d3d4882b9d4c014826237064741938f621d23aa585abf02c7612eb9f50e24a294b9cae2f4df0b111b37460e0cf03a511438dd2049d643

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvb:ymb3NkkiQ3mdBjF0yMly

Malware Config

Targets

    • Target

      b470addcbe243d3d6ede171df2a3ce70_NeikiAnalytics.exe

    • Size

      64KB

    • MD5

      b470addcbe243d3d6ede171df2a3ce70

    • SHA1

      2425d5d04413ce1ee15a59e5283d0b30731e9d58

    • SHA256

      38efcabff123ffa1b11a0ee0cd4329d595d62091c04118e8b4862307a277009f

    • SHA512

      36ba262edfac71613b1d3d4882b9d4c014826237064741938f621d23aa585abf02c7612eb9f50e24a294b9cae2f4df0b111b37460e0cf03a511438dd2049d643

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvb:ymb3NkkiQ3mdBjF0yMly

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks