General

  • Target

    3b75e875cc5b090a0033d134d6fe3b30_NeikiAnalytics.exe

  • Size

    480KB

  • Sample

    240519-bbhhqahh88

  • MD5

    3b75e875cc5b090a0033d134d6fe3b30

  • SHA1

    2df9085823f6eb84f48a80601f3b35ae41ffabe7

  • SHA256

    e30e1e3a03fadd3485afa4d5e172bcbbd4cd4a01753670e0fdf09f685e7c4ef4

  • SHA512

    a7fecc6c6049878591fca5b5b10bacf22ecf0bdc1028a6601848aa238068a79405ae7ccac5b0abe93962915227d4c5e708e2f76c7fa96d33b5f5a80be2dee737

  • SSDEEP

    12288:n3C9uDVw6326pKZ9asZqoZHz+evcn0Meh2Fez1:Su326p0aroZt0s1

Malware Config

Targets

    • Target

      3b75e875cc5b090a0033d134d6fe3b30_NeikiAnalytics.exe

    • Size

      480KB

    • MD5

      3b75e875cc5b090a0033d134d6fe3b30

    • SHA1

      2df9085823f6eb84f48a80601f3b35ae41ffabe7

    • SHA256

      e30e1e3a03fadd3485afa4d5e172bcbbd4cd4a01753670e0fdf09f685e7c4ef4

    • SHA512

      a7fecc6c6049878591fca5b5b10bacf22ecf0bdc1028a6601848aa238068a79405ae7ccac5b0abe93962915227d4c5e708e2f76c7fa96d33b5f5a80be2dee737

    • SSDEEP

      12288:n3C9uDVw6326pKZ9asZqoZHz+evcn0Meh2Fez1:Su326p0aroZt0s1

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks