General

  • Target

    62b43fbaf36975f6404d1c24ca690300_NeikiAnalytics.exe

  • Size

    89KB

  • Sample

    240519-dycbbsfh6t

  • MD5

    62b43fbaf36975f6404d1c24ca690300

  • SHA1

    b8277ccbe4ef42507303b34b3378038babdf694d

  • SHA256

    6afd24270f5c5e5e6fa4e01d3e7ad584c41a6337af447ca4ef2859ac501dd706

  • SHA512

    5a134a71510fc6da4d2dcc7be3ed37a5e5cce42fa5f1830679234e51bfae70f8a2959e07f2b9345dec619a8525ff341d78f4c5f0f6adb37e8306ab2bef8f7f69

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpI:8hOmTsF93UYfwC6GIout0fmCiiiXA6m2

Malware Config

Targets

    • Target

      62b43fbaf36975f6404d1c24ca690300_NeikiAnalytics.exe

    • Size

      89KB

    • MD5

      62b43fbaf36975f6404d1c24ca690300

    • SHA1

      b8277ccbe4ef42507303b34b3378038babdf694d

    • SHA256

      6afd24270f5c5e5e6fa4e01d3e7ad584c41a6337af447ca4ef2859ac501dd706

    • SHA512

      5a134a71510fc6da4d2dcc7be3ed37a5e5cce42fa5f1830679234e51bfae70f8a2959e07f2b9345dec619a8525ff341d78f4c5f0f6adb37e8306ab2bef8f7f69

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpI:8hOmTsF93UYfwC6GIout0fmCiiiXA6m2

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks