General

  • Target

    ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe

  • Size

    68KB

  • Sample

    240520-e25ygsbf52

  • MD5

    ac39b289bc71770f5d7242c48f8dbb70

  • SHA1

    b4c166e5426a153ba2f93aa86274c62e43915fe7

  • SHA256

    1f76c0949280ad24a805d3631e3b521857e992b87218a234862b9e6976298f79

  • SHA512

    99fcbcf24c77e66998a2dfdc4212b8d05571df9cf811531608510f2fc51a5954d06c3caccc5baf65cd977cd810f011c29855f80eff3cb651d98524d9f16e2991

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89+b:ymb3NkkiQ3mdBjFIvl358nLA89K

Malware Config

Targets

    • Target

      ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe

    • Size

      68KB

    • MD5

      ac39b289bc71770f5d7242c48f8dbb70

    • SHA1

      b4c166e5426a153ba2f93aa86274c62e43915fe7

    • SHA256

      1f76c0949280ad24a805d3631e3b521857e992b87218a234862b9e6976298f79

    • SHA512

      99fcbcf24c77e66998a2dfdc4212b8d05571df9cf811531608510f2fc51a5954d06c3caccc5baf65cd977cd810f011c29855f80eff3cb651d98524d9f16e2991

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89+b:ymb3NkkiQ3mdBjFIvl358nLA89K

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks