General

  • Target

    dbf3a497dedcc6609e73799e2be71110_NeikiAnalytics.exe

  • Size

    225KB

  • Sample

    240518-r9rr2sgh56

  • MD5

    dbf3a497dedcc6609e73799e2be71110

  • SHA1

    ec82942d558f016a103cc0d9f960eae89ba938a0

  • SHA256

    7cb4c5a114af771406acff1c8eec772ee5550130c8a66c44a7f825ee88b13caa

  • SHA512

    8b30452b1d62fd10fb68682b0e4086d39604472e826207829b02b5f36f671b0b285e9f285df7b314808748a81a59802790efd664edd76737cb38645bda872be7

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeG3:n3C9BRo7MlrWKo+lxK9

Malware Config

Targets

    • Target

      dbf3a497dedcc6609e73799e2be71110_NeikiAnalytics.exe

    • Size

      225KB

    • MD5

      dbf3a497dedcc6609e73799e2be71110

    • SHA1

      ec82942d558f016a103cc0d9f960eae89ba938a0

    • SHA256

      7cb4c5a114af771406acff1c8eec772ee5550130c8a66c44a7f825ee88b13caa

    • SHA512

      8b30452b1d62fd10fb68682b0e4086d39604472e826207829b02b5f36f671b0b285e9f285df7b314808748a81a59802790efd664edd76737cb38645bda872be7

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeG3:n3C9BRo7MlrWKo+lxK9

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks