General

  • Target

    413b10ef77ed0340941828085df7cd80_NeikiAnalytics.exe

  • Size

    226KB

  • Sample

    240519-bp6gpsag8s

  • MD5

    413b10ef77ed0340941828085df7cd80

  • SHA1

    1c67e0e51392e98fab50450dcf432033738a7415

  • SHA256

    e1d10ed3960178865dfc91a870e92fc5982d699da0e42f45339c8a53bd4222b9

  • SHA512

    02d158a1083eed5d9f350c9d323ed90c309b9fd45d54ad32775c23d8e76c5bbdefd1691072d41ec5972d325706f604566132d17ce9a8b08dde66a57048c79821

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x47WBY:n3C9BRo7MlrWKo+lxY

Malware Config

Targets

    • Target

      413b10ef77ed0340941828085df7cd80_NeikiAnalytics.exe

    • Size

      226KB

    • MD5

      413b10ef77ed0340941828085df7cd80

    • SHA1

      1c67e0e51392e98fab50450dcf432033738a7415

    • SHA256

      e1d10ed3960178865dfc91a870e92fc5982d699da0e42f45339c8a53bd4222b9

    • SHA512

      02d158a1083eed5d9f350c9d323ed90c309b9fd45d54ad32775c23d8e76c5bbdefd1691072d41ec5972d325706f604566132d17ce9a8b08dde66a57048c79821

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x47WBY:n3C9BRo7MlrWKo+lxY

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks