General

  • Target

    74d2adaf3eb04a26f8a84b10f1e1af80_NeikiAnalytics.exe

  • Size

    92KB

  • Sample

    240519-e7fksaag62

  • MD5

    74d2adaf3eb04a26f8a84b10f1e1af80

  • SHA1

    e6597768cd0b50b77d700d7bafb64bc1374a7a5c

  • SHA256

    27d93295d9d02865caad3ad5ee885868115d9504e37bf252046f678d30b5bed1

  • SHA512

    8ab1a3b747b367b140d61e1c07de81d9e786f9f520e538c3579c9ec98a760f825b48fdf243ded9e74adcfdbada231d87738e9392f69908a42b86701f93caf7e6

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpX4:8hOmTsF93UYfwC6GIout0fmCiiiXA6m6

Malware Config

Targets

    • Target

      74d2adaf3eb04a26f8a84b10f1e1af80_NeikiAnalytics.exe

    • Size

      92KB

    • MD5

      74d2adaf3eb04a26f8a84b10f1e1af80

    • SHA1

      e6597768cd0b50b77d700d7bafb64bc1374a7a5c

    • SHA256

      27d93295d9d02865caad3ad5ee885868115d9504e37bf252046f678d30b5bed1

    • SHA512

      8ab1a3b747b367b140d61e1c07de81d9e786f9f520e538c3579c9ec98a760f825b48fdf243ded9e74adcfdbada231d87738e9392f69908a42b86701f93caf7e6

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpX4:8hOmTsF93UYfwC6GIout0fmCiiiXA6m6

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks