General

  • Target

    7f0d7cb3ffcc88ef26de2eac0805d900_NeikiAnalytics.exe

  • Size

    200KB

  • Sample

    240519-fxa3zscb39

  • MD5

    7f0d7cb3ffcc88ef26de2eac0805d900

  • SHA1

    aa18569828a06ee21c569a8094c89621689ed2da

  • SHA256

    6c472082d41c432e23ad65ce98bb45cd110ab3c9ff9a19c1c6a4bf0fc4a4c536

  • SHA512

    e6918b1a3d9c3193efe8e6eb656985b2ff33bd567aff9818fdbd0c3324673bc9fbd9a57dfbeac29df05cfa00d2d58c435e48391089785ad7c077b56e639b8990

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUt6im:n3C9BRIG0asYFm71m8+GdkB9D

Malware Config

Targets

    • Target

      7f0d7cb3ffcc88ef26de2eac0805d900_NeikiAnalytics.exe

    • Size

      200KB

    • MD5

      7f0d7cb3ffcc88ef26de2eac0805d900

    • SHA1

      aa18569828a06ee21c569a8094c89621689ed2da

    • SHA256

      6c472082d41c432e23ad65ce98bb45cd110ab3c9ff9a19c1c6a4bf0fc4a4c536

    • SHA512

      e6918b1a3d9c3193efe8e6eb656985b2ff33bd567aff9818fdbd0c3324673bc9fbd9a57dfbeac29df05cfa00d2d58c435e48391089785ad7c077b56e639b8990

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUt6im:n3C9BRIG0asYFm71m8+GdkB9D

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks