General

  • Target

    dbe9f705a0a0e0548f6f8ccc007aee20_NeikiAnalytics.exe

  • Size

    540KB

  • Sample

    240519-r9353scc8s

  • MD5

    dbe9f705a0a0e0548f6f8ccc007aee20

  • SHA1

    96ea1d55dc4f9d8a71cbffd2b1dbf22e9c61a96b

  • SHA256

    5f53e124d08fb742e1c721a518415d8ea00d7f5b2d26ce8e2bd2bbc1badd9f77

  • SHA512

    16393c2b466ea623d469467098e37369cb12d0484b5ef5c7d43c65923035e30d2204fbcc997848273f43bdbbb96a6bf29871a1fc8f4a1186dcf39e6c9e2be1f9

  • SSDEEP

    6144:Ucm4FmowdHoSEsIR7DsFhraHcpOaKHpXfRo0V8JcgE+ezpg1xrloBNTNDoDb0:i4wFHoSEsIR7seFaKHpv/VycgE81lg/

Malware Config

Targets

    • Target

      dbe9f705a0a0e0548f6f8ccc007aee20_NeikiAnalytics.exe

    • Size

      540KB

    • MD5

      dbe9f705a0a0e0548f6f8ccc007aee20

    • SHA1

      96ea1d55dc4f9d8a71cbffd2b1dbf22e9c61a96b

    • SHA256

      5f53e124d08fb742e1c721a518415d8ea00d7f5b2d26ce8e2bd2bbc1badd9f77

    • SHA512

      16393c2b466ea623d469467098e37369cb12d0484b5ef5c7d43c65923035e30d2204fbcc997848273f43bdbbb96a6bf29871a1fc8f4a1186dcf39e6c9e2be1f9

    • SSDEEP

      6144:Ucm4FmowdHoSEsIR7DsFhraHcpOaKHpXfRo0V8JcgE+ezpg1xrloBNTNDoDb0:i4wFHoSEsIR7seFaKHpv/VycgE81lg/

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks