General

  • Target

    f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe

  • Size

    381KB

  • Sample

    240519-twhy4afd3v

  • MD5

    f1885cb2016cd8ba7abbb68967dd1ad0

  • SHA1

    ce6d86cdb442c318b22fb4ca4d2df681b63e95b6

  • SHA256

    5736438a3bef53bde9a5bd6d7a7891164c2f89e5e516f979cacfb8c296bc9ea2

  • SHA512

    b8c2e3fb824ee045c873221053fe0999349543c23a91211538e2911968bbecc2d1c415cdc7ab4ed663a8e030772ed516055a644b04adfa9665172ad9f5101cdb

  • SSDEEP

    6144:kcm4FmowdHoSphraHcpOaKHpSwp9OD0IbswYT/:y4wFHoS3eFaKHpNKbbswe/

Malware Config

Targets

    • Target

      f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe

    • Size

      381KB

    • MD5

      f1885cb2016cd8ba7abbb68967dd1ad0

    • SHA1

      ce6d86cdb442c318b22fb4ca4d2df681b63e95b6

    • SHA256

      5736438a3bef53bde9a5bd6d7a7891164c2f89e5e516f979cacfb8c296bc9ea2

    • SHA512

      b8c2e3fb824ee045c873221053fe0999349543c23a91211538e2911968bbecc2d1c415cdc7ab4ed663a8e030772ed516055a644b04adfa9665172ad9f5101cdb

    • SSDEEP

      6144:kcm4FmowdHoSphraHcpOaKHpSwp9OD0IbswYT/:y4wFHoS3eFaKHpNKbbswe/

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks