General

  • Target

    4c8dab3abf787c72a54c2cb6e6d91450_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240519-cb7naace2t

  • MD5

    4c8dab3abf787c72a54c2cb6e6d91450

  • SHA1

    28012071abd156b729efca27f7eca3b99356eb97

  • SHA256

    6a2e59b48fb228820f0da8dc5a51e2030b249a5baac32f5ce0b428ac15b38137

  • SHA512

    b7126b415e88d81265df8a8df827ee3768d91d8a08db53490eff9b53119b2c9b7c555ecc0468e6aa85f5fb7b10d11c7b0c331f3de19f72ec077ad66809840a0e

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wVEJesfb:ymb3NkkiQ3mdBjF+3TU2KEJvz

Malware Config

Targets

    • Target

      4c8dab3abf787c72a54c2cb6e6d91450_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      4c8dab3abf787c72a54c2cb6e6d91450

    • SHA1

      28012071abd156b729efca27f7eca3b99356eb97

    • SHA256

      6a2e59b48fb228820f0da8dc5a51e2030b249a5baac32f5ce0b428ac15b38137

    • SHA512

      b7126b415e88d81265df8a8df827ee3768d91d8a08db53490eff9b53119b2c9b7c555ecc0468e6aa85f5fb7b10d11c7b0c331f3de19f72ec077ad66809840a0e

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wVEJesfb:ymb3NkkiQ3mdBjF+3TU2KEJvz

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks