General

  • Target

    94b9e9268a0eec746e9359e10b027c30_NeikiAnalytics.exe

  • Size

    455KB

  • Sample

    240519-hha6jseh98

  • MD5

    94b9e9268a0eec746e9359e10b027c30

  • SHA1

    36c8053a4ed5803d6aa7c30505181083bd571673

  • SHA256

    1ca56d7536a4aa32a0ab5e93cbaca60dd37ae922e17e992ea0eb94c9b8c8ade7

  • SHA512

    b12288d6bd872eaae520ef4763ae42dec1e5e96af9ed9b536bbfa6dd75a628c2a296e435688cdd1ffe87dbfb30ae1d575c2cfa44e6a5601d70ad39bb43791cdc

  • SSDEEP

    12288:y4wFHoS3eFp3IDvSbh5nPYERAAUDCa4NYmF:HFp3lz1XUDCaGYmF

Malware Config

Targets

    • Target

      94b9e9268a0eec746e9359e10b027c30_NeikiAnalytics.exe

    • Size

      455KB

    • MD5

      94b9e9268a0eec746e9359e10b027c30

    • SHA1

      36c8053a4ed5803d6aa7c30505181083bd571673

    • SHA256

      1ca56d7536a4aa32a0ab5e93cbaca60dd37ae922e17e992ea0eb94c9b8c8ade7

    • SHA512

      b12288d6bd872eaae520ef4763ae42dec1e5e96af9ed9b536bbfa6dd75a628c2a296e435688cdd1ffe87dbfb30ae1d575c2cfa44e6a5601d70ad39bb43791cdc

    • SSDEEP

      12288:y4wFHoS3eFp3IDvSbh5nPYERAAUDCa4NYmF:HFp3lz1XUDCaGYmF

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks