General

  • Target

    86bb743dcd4965f3587c9d736a9dd660_NeikiAnalytics.exe

  • Size

    64KB

  • Sample

    240519-ggxgqadb2y

  • MD5

    86bb743dcd4965f3587c9d736a9dd660

  • SHA1

    f826759064746a2e8b74ab7b2db37e6aef5937c5

  • SHA256

    f009f8375abde1c5967c027b2800fc80cd60b20e82ca696cbbb98f92cdf97ceb

  • SHA512

    e50495db271829268c64c37e4016e6f9a03a5975addfd50260e9336db7198dd2c62de669a160a0ebc73fa27072b383fddc410bbf329a8d2ea00378ab559b217d

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvd0:ymb3NkkiQ3mdBjF0yMl1

Malware Config

Targets

    • Target

      86bb743dcd4965f3587c9d736a9dd660_NeikiAnalytics.exe

    • Size

      64KB

    • MD5

      86bb743dcd4965f3587c9d736a9dd660

    • SHA1

      f826759064746a2e8b74ab7b2db37e6aef5937c5

    • SHA256

      f009f8375abde1c5967c027b2800fc80cd60b20e82ca696cbbb98f92cdf97ceb

    • SHA512

      e50495db271829268c64c37e4016e6f9a03a5975addfd50260e9336db7198dd2c62de669a160a0ebc73fa27072b383fddc410bbf329a8d2ea00378ab559b217d

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvd0:ymb3NkkiQ3mdBjF0yMl1

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks