General

  • Target

    f49e75cb85f3d36cb481bedcf53360c0_NeikiAnalytics.exe

  • Size

    480KB

  • Sample

    240519-t4qnxafh4w

  • MD5

    f49e75cb85f3d36cb481bedcf53360c0

  • SHA1

    1858dc47db86a9e9ccacc2335da15fc6019df891

  • SHA256

    a206acb1937cf2f141753424384583ffcae9b4276e8085f5461ba38fc6da5abd

  • SHA512

    eb945a62252591ab985bf02a75cc1cd2b36836d1cf4f43afef58cf3d47235d8e3f5d28de700cf8bcdc17b2254e56391a6b8a52fc528c43255c518c1aed4aebd8

  • SSDEEP

    12288:n3C9uDVw6326pKZ9asZqoZHz+evcn0Meh2Fezy:Su326p0aroZt0sy

Malware Config

Targets

    • Target

      f49e75cb85f3d36cb481bedcf53360c0_NeikiAnalytics.exe

    • Size

      480KB

    • MD5

      f49e75cb85f3d36cb481bedcf53360c0

    • SHA1

      1858dc47db86a9e9ccacc2335da15fc6019df891

    • SHA256

      a206acb1937cf2f141753424384583ffcae9b4276e8085f5461ba38fc6da5abd

    • SHA512

      eb945a62252591ab985bf02a75cc1cd2b36836d1cf4f43afef58cf3d47235d8e3f5d28de700cf8bcdc17b2254e56391a6b8a52fc528c43255c518c1aed4aebd8

    • SSDEEP

      12288:n3C9uDVw6326pKZ9asZqoZHz+evcn0Meh2Fezy:Su326p0aroZt0sy

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks