General

  • Target

    4be88a026ee47c31eff2af36841ac3e0_NeikiAnalytics.exe

  • Size

    377KB

  • Sample

    240519-2db2tsdh9t

  • MD5

    4be88a026ee47c31eff2af36841ac3e0

  • SHA1

    84e4e91c84329949ee391be72b031318b7884473

  • SHA256

    3f296e1123ddf547e990523a12274705d7307fcbfa55887892e65e0320221717

  • SHA512

    32cb35d6750f31dd2f85475eccb92843bfec10f5ea4f29f2638b5187446c09d9c887c80e17468edf65d7af9160a5bc995a42d5a311a73d293a85d11673758fc0

  • SSDEEP

    6144:9cm4FmowdHoSABIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7N:/4wFHoSA4KofHfHTXQLzgvnzHPowYbv0

Malware Config

Targets

    • Target

      4be88a026ee47c31eff2af36841ac3e0_NeikiAnalytics.exe

    • Size

      377KB

    • MD5

      4be88a026ee47c31eff2af36841ac3e0

    • SHA1

      84e4e91c84329949ee391be72b031318b7884473

    • SHA256

      3f296e1123ddf547e990523a12274705d7307fcbfa55887892e65e0320221717

    • SHA512

      32cb35d6750f31dd2f85475eccb92843bfec10f5ea4f29f2638b5187446c09d9c887c80e17468edf65d7af9160a5bc995a42d5a311a73d293a85d11673758fc0

    • SSDEEP

      6144:9cm4FmowdHoSABIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7N:/4wFHoSA4KofHfHTXQLzgvnzHPowYbv0

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks