General

  • Target

    e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe

  • Size

    99KB

  • Sample

    240520-l8ajgsfe5y

  • MD5

    e50c2ae097fd2a808fbc3a0d559b2020

  • SHA1

    d4a12df09db7465bf810e0954395e7b05142da16

  • SHA256

    cbf3c8473c0750fa44fe095059509bb6fc1965dd5ecb5ec24b559869578dc955

  • SHA512

    6bc0c6ed817a28d927c834dcaaaa327059d3830d312c475aa0d31ca44d2856bc6e2944a4485277352613f5f117c439ce3bfb88b9a7e4a1e0bdde37570ebcabbc

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq/4wcD:n3C9BRo7tvnJ99T/KZE/8

Malware Config

Targets

    • Target

      e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe

    • Size

      99KB

    • MD5

      e50c2ae097fd2a808fbc3a0d559b2020

    • SHA1

      d4a12df09db7465bf810e0954395e7b05142da16

    • SHA256

      cbf3c8473c0750fa44fe095059509bb6fc1965dd5ecb5ec24b559869578dc955

    • SHA512

      6bc0c6ed817a28d927c834dcaaaa327059d3830d312c475aa0d31ca44d2856bc6e2944a4485277352613f5f117c439ce3bfb88b9a7e4a1e0bdde37570ebcabbc

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq/4wcD:n3C9BRo7tvnJ99T/KZE/8

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks