General

  • Target

    3cba0fb76f7e24be8758c1e572b55740_NeikiAnalytics.exe

  • Size

    585KB

  • Sample

    240519-beq92aaa4t

  • MD5

    3cba0fb76f7e24be8758c1e572b55740

  • SHA1

    a0ab49bee53e8f3bc354e8e43dbf7ed0a7348338

  • SHA256

    eecb456061d27393e42c39490c265eb5c7e73d5c8a11057f06e6eded4bee8d30

  • SHA512

    00363f0e437a777ea17a6b5f9ea1144f446c9b70e83804bc74f118ab04877d343b4bd210ee0262c59b021390817c7ce5cf59cb6859b9dbe513c8715d7f1a0350

  • SSDEEP

    12288:n3C9ytvngQjuPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QiZQ:SgdnJKPh2kkkkK4kXkkkkkkkkJQ

Malware Config

Targets

    • Target

      3cba0fb76f7e24be8758c1e572b55740_NeikiAnalytics.exe

    • Size

      585KB

    • MD5

      3cba0fb76f7e24be8758c1e572b55740

    • SHA1

      a0ab49bee53e8f3bc354e8e43dbf7ed0a7348338

    • SHA256

      eecb456061d27393e42c39490c265eb5c7e73d5c8a11057f06e6eded4bee8d30

    • SHA512

      00363f0e437a777ea17a6b5f9ea1144f446c9b70e83804bc74f118ab04877d343b4bd210ee0262c59b021390817c7ce5cf59cb6859b9dbe513c8715d7f1a0350

    • SSDEEP

      12288:n3C9ytvngQjuPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QiZQ:SgdnJKPh2kkkkK4kXkkkkkkkkJQ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks