General

  • Target

    dbcc557ba45616901917a32bc04f6f30_NeikiAnalytics.exe

  • Size

    473KB

  • Sample

    240518-r9ahrsgh28

  • MD5

    dbcc557ba45616901917a32bc04f6f30

  • SHA1

    b9826f92b23893d1b2deca93d5bd96f1e3daf68f

  • SHA256

    d2692821bcec5b8cba1452871b9ffe1dbbe6e30bc149762f4c8ecf3aa4656391

  • SHA512

    7bade5d2a872edd41c90704ccbe7c913b481cc183bc8ce7d9280ab219d5429691e7d968cfeb393f77b74835e987979531d3d4358004ca57da99297d23da8149a

  • SSDEEP

    6144:lcm7ImGddXmNt251UriZFwT+aZKl7pg1xBR:H7Tc2NYHUrAwT+OKLSjR

Malware Config

Targets

    • Target

      dbcc557ba45616901917a32bc04f6f30_NeikiAnalytics.exe

    • Size

      473KB

    • MD5

      dbcc557ba45616901917a32bc04f6f30

    • SHA1

      b9826f92b23893d1b2deca93d5bd96f1e3daf68f

    • SHA256

      d2692821bcec5b8cba1452871b9ffe1dbbe6e30bc149762f4c8ecf3aa4656391

    • SHA512

      7bade5d2a872edd41c90704ccbe7c913b481cc183bc8ce7d9280ab219d5429691e7d968cfeb393f77b74835e987979531d3d4358004ca57da99297d23da8149a

    • SSDEEP

      6144:lcm7ImGddXmNt251UriZFwT+aZKl7pg1xBR:H7Tc2NYHUrAwT+OKLSjR

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks