General

  • Target

    eb6e43acedec97c2cb41be66f6385f70_NeikiAnalytics.exe

  • Size

    70KB

  • Sample

    240518-tt2y7aca7z

  • MD5

    eb6e43acedec97c2cb41be66f6385f70

  • SHA1

    f2e036808394eb4262dd971d20388f05c20de981

  • SHA256

    e5fee681c97035ab3fb9662b1b28646696cd916a647a6e3abc6c7fc8711b5ba1

  • SHA512

    ec1d98e58943f784edb9c295c43d449fd27a958059fd025a33075b08df63461a8b8a00e4470388504c75c95ceef76f2b1e32a1709f18f751575436af5106dad4

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgyYrr:ymb3NkkiQ3mdBjFo73thY3

Malware Config

Targets

    • Target

      eb6e43acedec97c2cb41be66f6385f70_NeikiAnalytics.exe

    • Size

      70KB

    • MD5

      eb6e43acedec97c2cb41be66f6385f70

    • SHA1

      f2e036808394eb4262dd971d20388f05c20de981

    • SHA256

      e5fee681c97035ab3fb9662b1b28646696cd916a647a6e3abc6c7fc8711b5ba1

    • SHA512

      ec1d98e58943f784edb9c295c43d449fd27a958059fd025a33075b08df63461a8b8a00e4470388504c75c95ceef76f2b1e32a1709f18f751575436af5106dad4

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgyYrr:ymb3NkkiQ3mdBjFo73thY3

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks