General

  • Target

    e780124fbf8d688dcc2b2f0af704adb0_NeikiAnalytics.exe

  • Size

    67KB

  • Sample

    240520-mekyssfh6v

  • MD5

    e780124fbf8d688dcc2b2f0af704adb0

  • SHA1

    b2e9e1ed42bb22cbfc10da53d7a52234e98a33c0

  • SHA256

    a2c694575e73f73c81518ea6d1115ffd4c24ae160ec041b87671cc86b17f5dba

  • SHA512

    ea71c06f59f609e669328c0d811a72d568f537a1c419ffbab8ce1c32b5827463d69c104329b8ae402e66569a667f74a8bdbe82a01061023218d1d7ccf8431127

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+LuvPrgpXtU:ymb3NkkiQ3mdBjF0yMlwrSU

Malware Config

Targets

    • Target

      e780124fbf8d688dcc2b2f0af704adb0_NeikiAnalytics.exe

    • Size

      67KB

    • MD5

      e780124fbf8d688dcc2b2f0af704adb0

    • SHA1

      b2e9e1ed42bb22cbfc10da53d7a52234e98a33c0

    • SHA256

      a2c694575e73f73c81518ea6d1115ffd4c24ae160ec041b87671cc86b17f5dba

    • SHA512

      ea71c06f59f609e669328c0d811a72d568f537a1c419ffbab8ce1c32b5827463d69c104329b8ae402e66569a667f74a8bdbe82a01061023218d1d7ccf8431127

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+LuvPrgpXtU:ymb3NkkiQ3mdBjF0yMlwrSU

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks