General

  • Target

    d6d827d01a9a6150fe87e5df7964e590_NeikiAnalytics.exe

  • Size

    88KB

  • Sample

    240519-rstv3sbg6y

  • MD5

    d6d827d01a9a6150fe87e5df7964e590

  • SHA1

    94147b347d2481f2c83fedb9d5e183d0d4be14bc

  • SHA256

    7adce874d484e72f8a8ef5cce0bd6060e4e9762f7a2d05afcd4b9d132ab90044

  • SHA512

    8af88b1f9ad6350bd4265a30bc5c0d5b8eb44f0e7ccfac7842610d5bbcdeecab6b0696159b28a0e26fa4a2431d9c02466145d07ea560a8339240d0d0f4fe7233

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73yqKH/Kjve2:ymb3NkkiQ3mdBjFo73yX+vZ

Malware Config

Targets

    • Target

      d6d827d01a9a6150fe87e5df7964e590_NeikiAnalytics.exe

    • Size

      88KB

    • MD5

      d6d827d01a9a6150fe87e5df7964e590

    • SHA1

      94147b347d2481f2c83fedb9d5e183d0d4be14bc

    • SHA256

      7adce874d484e72f8a8ef5cce0bd6060e4e9762f7a2d05afcd4b9d132ab90044

    • SHA512

      8af88b1f9ad6350bd4265a30bc5c0d5b8eb44f0e7ccfac7842610d5bbcdeecab6b0696159b28a0e26fa4a2431d9c02466145d07ea560a8339240d0d0f4fe7233

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73yqKH/Kjve2:ymb3NkkiQ3mdBjFo73yX+vZ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks