General

  • Target

    e6cbef971162d4281117523804676300_NeikiAnalytics.exe

  • Size

    90KB

  • Sample

    240520-mckv1sfg5t

  • MD5

    e6cbef971162d4281117523804676300

  • SHA1

    50fce3364a69984e8c17c51cdee4e5a5daff29c6

  • SHA256

    c1f97d7a011d1cbe5fbcea6ad0934eec76eda7c290a17ea79c67168ff57e015f

  • SHA512

    7ee2b5a9c286ea1a31d2fa936a196305dc6cd05f92fdd4c6df0a7e9e4b6fc4b276c0e6bfd6e1183b91de02bd6401ee50dadd4459a2b2c0c7a375846fbed8d8e3

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpb:8hOmTsF93UYfwC6GIout0fmCiiiXA6ml

Malware Config

Targets

    • Target

      e6cbef971162d4281117523804676300_NeikiAnalytics.exe

    • Size

      90KB

    • MD5

      e6cbef971162d4281117523804676300

    • SHA1

      50fce3364a69984e8c17c51cdee4e5a5daff29c6

    • SHA256

      c1f97d7a011d1cbe5fbcea6ad0934eec76eda7c290a17ea79c67168ff57e015f

    • SHA512

      7ee2b5a9c286ea1a31d2fa936a196305dc6cd05f92fdd4c6df0a7e9e4b6fc4b276c0e6bfd6e1183b91de02bd6401ee50dadd4459a2b2c0c7a375846fbed8d8e3

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpb:8hOmTsF93UYfwC6GIout0fmCiiiXA6ml

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks