General

  • Target

    3d04f0e55c714bf7cf6e2729c41dda50_NeikiAnalytics.exe

  • Size

    224KB

  • Sample

    240519-z76r7aaf4y

  • MD5

    3d04f0e55c714bf7cf6e2729c41dda50

  • SHA1

    e6f75edf160726833cf9e7da79fbd235ce641090

  • SHA256

    5948c6d686492f94b4905b400c156d8128c4fb161ea9b9c0680aa29df3f1bc8a

  • SHA512

    6a51e92d5bafc32acc81e25718515298712a5427ba90faf13763254dad625ef978c6efdfaa5990e44b791ad2ec932587c992a469b11302186d8ed9fb57a15460

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLW:n3C9BRo7MlrWKo+lxKW

Malware Config

Targets

    • Target

      3d04f0e55c714bf7cf6e2729c41dda50_NeikiAnalytics.exe

    • Size

      224KB

    • MD5

      3d04f0e55c714bf7cf6e2729c41dda50

    • SHA1

      e6f75edf160726833cf9e7da79fbd235ce641090

    • SHA256

      5948c6d686492f94b4905b400c156d8128c4fb161ea9b9c0680aa29df3f1bc8a

    • SHA512

      6a51e92d5bafc32acc81e25718515298712a5427ba90faf13763254dad625ef978c6efdfaa5990e44b791ad2ec932587c992a469b11302186d8ed9fb57a15460

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLW:n3C9BRo7MlrWKo+lxKW

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks