General

  • Target

    4d80bf26a8ae547018e5c490af88de90_NeikiAnalytics.exe

  • Size

    64KB

  • Sample

    240519-cd26kscf5t

  • MD5

    4d80bf26a8ae547018e5c490af88de90

  • SHA1

    f422ccb67549a6b09c231a9dd1976b155f769b29

  • SHA256

    9434a81b9e30ac69a3a97272fb7951c58e1a327b833945a7711fccbf523fba7f

  • SHA512

    a8b56f797ecb7885d21422dafbc184a7b3cde0841d25bb387e19163631d0a01585aa3f9919a64146b89cd96a36f9944c244644ce514827757ce8ed37c2443982

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+LuvdK:ymb3NkkiQ3mdBjF0yMlv

Malware Config

Targets

    • Target

      4d80bf26a8ae547018e5c490af88de90_NeikiAnalytics.exe

    • Size

      64KB

    • MD5

      4d80bf26a8ae547018e5c490af88de90

    • SHA1

      f422ccb67549a6b09c231a9dd1976b155f769b29

    • SHA256

      9434a81b9e30ac69a3a97272fb7951c58e1a327b833945a7711fccbf523fba7f

    • SHA512

      a8b56f797ecb7885d21422dafbc184a7b3cde0841d25bb387e19163631d0a01585aa3f9919a64146b89cd96a36f9944c244644ce514827757ce8ed37c2443982

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+LuvdK:ymb3NkkiQ3mdBjF0yMlv

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks