General

  • Target

    85aa740cb6ff526b4185a8f007f2b790_NeikiAnalytics.exe

  • Size

    59KB

  • Sample

    240519-gel8zach9v

  • MD5

    85aa740cb6ff526b4185a8f007f2b790

  • SHA1

    3ad3957b0ff5698ff1b25d4d9efffa7c0bfd1c18

  • SHA256

    6a959f7962f6b54df4f77ed266e4e28e421e57e5ce6f3f5c52e445a59cccf2be

  • SHA512

    e7c824e721d278e59c3818ed297a9359a9ae40c5788522093de673c5f10aafc0843cda509656c0ced4c764616114710e3e067fe63e07ced9dca0608d65e0d3b4

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsImsBF:ymb3NkkiQ3mdBjFIsIFBF

Malware Config

Targets

    • Target

      85aa740cb6ff526b4185a8f007f2b790_NeikiAnalytics.exe

    • Size

      59KB

    • MD5

      85aa740cb6ff526b4185a8f007f2b790

    • SHA1

      3ad3957b0ff5698ff1b25d4d9efffa7c0bfd1c18

    • SHA256

      6a959f7962f6b54df4f77ed266e4e28e421e57e5ce6f3f5c52e445a59cccf2be

    • SHA512

      e7c824e721d278e59c3818ed297a9359a9ae40c5788522093de673c5f10aafc0843cda509656c0ced4c764616114710e3e067fe63e07ced9dca0608d65e0d3b4

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsImsBF:ymb3NkkiQ3mdBjFIsIFBF

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks