General

  • Target

    4291685026a80f0623f1cc3c7b9c2250_NeikiAnalytics.exe

  • Size

    121KB

  • Sample

    240519-bsyw2abb86

  • MD5

    4291685026a80f0623f1cc3c7b9c2250

  • SHA1

    d105fe77e2bd332da338d84daa111e12ec647646

  • SHA256

    e0bd357c1e575942392c526e67f280691b88c9d50c06c32e71eae13757e87515

  • SHA512

    74b5545cd6e35871da29d183975914f7975b27ea0e08c9ced2e58f87eff6fc2fe6545a49450980baa7e2df6972ccbd7208a71e96f2935038b04450c97296ad8d

  • SSDEEP

    3072:9hOmTsF93UYfwC6GIoutz5yLpcka62c+8+dRN1Q:9cm4FmowdHoSZ6lCX0

Malware Config

Targets

    • Target

      4291685026a80f0623f1cc3c7b9c2250_NeikiAnalytics.exe

    • Size

      121KB

    • MD5

      4291685026a80f0623f1cc3c7b9c2250

    • SHA1

      d105fe77e2bd332da338d84daa111e12ec647646

    • SHA256

      e0bd357c1e575942392c526e67f280691b88c9d50c06c32e71eae13757e87515

    • SHA512

      74b5545cd6e35871da29d183975914f7975b27ea0e08c9ced2e58f87eff6fc2fe6545a49450980baa7e2df6972ccbd7208a71e96f2935038b04450c97296ad8d

    • SSDEEP

      3072:9hOmTsF93UYfwC6GIoutz5yLpcka62c+8+dRN1Q:9cm4FmowdHoSZ6lCX0

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks