General

  • Target

    c2c178eb40ce4937b88e9aca52631600_NeikiAnalytics.exe

  • Size

    77KB

  • Sample

    240519-p4s2tahh4t

  • MD5

    c2c178eb40ce4937b88e9aca52631600

  • SHA1

    aba96663342d5378e333c63f1bac77e230acef43

  • SHA256

    b929f858287b950657c6df42075b23d12b38321351322bc4da60c4c7a58143cd

  • SHA512

    ba3b962ece343b72764dd63608cce3f34672748d426505f9f49860e56648b1d59f728581a2fceaf9da500658680689cf35f16d6293ba0dc179100aea4d8f5018

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgygQwKjiawEmBz:ymb3NkkiQ3mdBjFo73thgQ/wEkz

Malware Config

Targets

    • Target

      c2c178eb40ce4937b88e9aca52631600_NeikiAnalytics.exe

    • Size

      77KB

    • MD5

      c2c178eb40ce4937b88e9aca52631600

    • SHA1

      aba96663342d5378e333c63f1bac77e230acef43

    • SHA256

      b929f858287b950657c6df42075b23d12b38321351322bc4da60c4c7a58143cd

    • SHA512

      ba3b962ece343b72764dd63608cce3f34672748d426505f9f49860e56648b1d59f728581a2fceaf9da500658680689cf35f16d6293ba0dc179100aea4d8f5018

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgygQwKjiawEmBz:ymb3NkkiQ3mdBjFo73thgQ/wEkz

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks