General

  • Target

    a572d2146f41c7563ade90df220eec30_NeikiAnalytics.exe

  • Size

    255KB

  • Sample

    240520-efty4abb3y

  • MD5

    a572d2146f41c7563ade90df220eec30

  • SHA1

    7a39dbf398278411f9fae96fdec4b035afc3086e

  • SHA256

    560ce4c13af91e29af8fa5da84f6db4f69aeeca227025949b56b24818c1c1467

  • SHA512

    78fa86bdbdb9212f4a4304339b39972b2fa693f2d506054ddf761ab7c9c9d93c4f7def6a75dcd12b20bda0726f78f7769384d586b3fdfcf240741c23b48eb906

  • SSDEEP

    6144:kcm4FmowdHoSphraHcpOaKHpolTjZXvEQo9dfra:y4wFHoS3eFaKHpKT9XvEhdfra

Malware Config

Targets

    • Target

      a572d2146f41c7563ade90df220eec30_NeikiAnalytics.exe

    • Size

      255KB

    • MD5

      a572d2146f41c7563ade90df220eec30

    • SHA1

      7a39dbf398278411f9fae96fdec4b035afc3086e

    • SHA256

      560ce4c13af91e29af8fa5da84f6db4f69aeeca227025949b56b24818c1c1467

    • SHA512

      78fa86bdbdb9212f4a4304339b39972b2fa693f2d506054ddf761ab7c9c9d93c4f7def6a75dcd12b20bda0726f78f7769384d586b3fdfcf240741c23b48eb906

    • SSDEEP

      6144:kcm4FmowdHoSphraHcpOaKHpolTjZXvEQo9dfra:y4wFHoS3eFaKHpKT9XvEhdfra

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks