General

  • Target

    56df2e044cc2e01894199443044c9490_NeikiAnalytics.exe

  • Size

    521KB

  • Sample

    240519-c4eszaeb4x

  • MD5

    56df2e044cc2e01894199443044c9490

  • SHA1

    033d2bbdbc4fe319f3cb87042726ece1dcd5f196

  • SHA256

    9d77713254e1473c16179cfdb012389040c480bc4de074b36dd5df0daf59d252

  • SHA512

    d3cd535300fe1d0dc32601e7db0c774ebd1c2425e32ff84aca79d21c941c9d653840ced88eaf4a01b0b19cbdcbceef374958537ed1655f69479cac99e64cb1be

  • SSDEEP

    6144:8cm7ImGddXmNt251UriZFwfsDX2CfNnkymTwaJ3o89H3v:q7Tc2NYHUrAwfMHNnpls489/

Malware Config

Targets

    • Target

      56df2e044cc2e01894199443044c9490_NeikiAnalytics.exe

    • Size

      521KB

    • MD5

      56df2e044cc2e01894199443044c9490

    • SHA1

      033d2bbdbc4fe319f3cb87042726ece1dcd5f196

    • SHA256

      9d77713254e1473c16179cfdb012389040c480bc4de074b36dd5df0daf59d252

    • SHA512

      d3cd535300fe1d0dc32601e7db0c774ebd1c2425e32ff84aca79d21c941c9d653840ced88eaf4a01b0b19cbdcbceef374958537ed1655f69479cac99e64cb1be

    • SSDEEP

      6144:8cm7ImGddXmNt251UriZFwfsDX2CfNnkymTwaJ3o89H3v:q7Tc2NYHUrAwfMHNnpls489/

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks