General

  • Target

    d36e8ab87b3fa7fb41c38c33f135aae0_NeikiAnalytics.exe

  • Size

    275KB

  • Sample

    240519-rjfxvsbd8x

  • MD5

    d36e8ab87b3fa7fb41c38c33f135aae0

  • SHA1

    6d2f61fc8e960d208d9b17c522e79be40e0ae64f

  • SHA256

    05978b63e4a00262e78b5b9fe6d332405487bd179029a943e94de6f2374a0e56

  • SHA512

    d1c44329d74fbbb0daf87cf4ccdbf95a093086fa52d4287df12403eb9efa5b854c82adb818b159609f46b19a98bd80559119473f7dc16ef84c686c780aaa3da9

  • SSDEEP

    6144:n3C9BRIG0asYFm71m8+GdkB9yMu7Vvemo:n3C9uYA71kSMue

Malware Config

Targets

    • Target

      d36e8ab87b3fa7fb41c38c33f135aae0_NeikiAnalytics.exe

    • Size

      275KB

    • MD5

      d36e8ab87b3fa7fb41c38c33f135aae0

    • SHA1

      6d2f61fc8e960d208d9b17c522e79be40e0ae64f

    • SHA256

      05978b63e4a00262e78b5b9fe6d332405487bd179029a943e94de6f2374a0e56

    • SHA512

      d1c44329d74fbbb0daf87cf4ccdbf95a093086fa52d4287df12403eb9efa5b854c82adb818b159609f46b19a98bd80559119473f7dc16ef84c686c780aaa3da9

    • SSDEEP

      6144:n3C9BRIG0asYFm71m8+GdkB9yMu7Vvemo:n3C9uYA71kSMue

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks