General

  • Target

    875eb0fe36d5e2900dfde460883118a0_NeikiAnalytics.exe

  • Size

    433KB

  • Sample

    240520-ccq2xsec48

  • MD5

    875eb0fe36d5e2900dfde460883118a0

  • SHA1

    b79f86251e71693177360823a00dbf2c0c0ef3ce

  • SHA256

    1e37ef068c8d73d0e3b533c47a4141aa57a664d1a66df239fbd5b325da4b8644

  • SHA512

    1d4e0946caed9367c720ea6ffcd269d4c510773e298386c718676823d0eed64857b4abffeb2690bfe3751fedd271bebb670507878253326566236dbb90dba9e5

  • SSDEEP

    12288:n3C9uMPh2kkkkK4kXkkkkkkkkl888888888888888888nR:ShPh2kkkkK4kXkkkkkkkkf

Malware Config

Targets

    • Target

      875eb0fe36d5e2900dfde460883118a0_NeikiAnalytics.exe

    • Size

      433KB

    • MD5

      875eb0fe36d5e2900dfde460883118a0

    • SHA1

      b79f86251e71693177360823a00dbf2c0c0ef3ce

    • SHA256

      1e37ef068c8d73d0e3b533c47a4141aa57a664d1a66df239fbd5b325da4b8644

    • SHA512

      1d4e0946caed9367c720ea6ffcd269d4c510773e298386c718676823d0eed64857b4abffeb2690bfe3751fedd271bebb670507878253326566236dbb90dba9e5

    • SSDEEP

      12288:n3C9uMPh2kkkkK4kXkkkkkkkkl888888888888888888nR:ShPh2kkkkK4kXkkkkkkkkf

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks