General

  • Target

    7c8553c5fe13cb4407280f2984f72020_NeikiAnalytics.exe

  • Size

    55KB

  • Sample

    240519-frbsbsbf6x

  • MD5

    7c8553c5fe13cb4407280f2984f72020

  • SHA1

    dc730967018e05e8702b688d0c1197d78dbad1a2

  • SHA256

    35ba9c7f281972ff6123940f8dc9c2446cb0358768b638e04cbd9d8f5dd18c22

  • SHA512

    62be8b2d6553244f235f12761ffedc18d4dd1e116acf7575397fc22aa729742cdb35026ba34842f7cfe239ef31c21093130a986233ee3d08e2fb5cdb0e77f8d8

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfEVA:ymb3NkkiQ3mdBjFIn

Malware Config

Targets

    • Target

      7c8553c5fe13cb4407280f2984f72020_NeikiAnalytics.exe

    • Size

      55KB

    • MD5

      7c8553c5fe13cb4407280f2984f72020

    • SHA1

      dc730967018e05e8702b688d0c1197d78dbad1a2

    • SHA256

      35ba9c7f281972ff6123940f8dc9c2446cb0358768b638e04cbd9d8f5dd18c22

    • SHA512

      62be8b2d6553244f235f12761ffedc18d4dd1e116acf7575397fc22aa729742cdb35026ba34842f7cfe239ef31c21093130a986233ee3d08e2fb5cdb0e77f8d8

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfEVA:ymb3NkkiQ3mdBjFIn

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks