General

  • Target

    f18234443933adce15e6f6e2da6079f0_NeikiAnalytics.exe

  • Size

    115KB

  • Sample

    240520-nbxzmagh63

  • MD5

    f18234443933adce15e6f6e2da6079f0

  • SHA1

    97d64734fb634dd258d94a6c824d7d89f98ce797

  • SHA256

    8b161ef64ce1eb10344f968cf23b9a42e605d77c0a3d8fb60094a44ddd5d670a

  • SHA512

    1d1c1802f649c4bd5d69c6716cb03d4309fddf913b119ee544365e37dddb07643ac37bc04bc95e9a5fdcb659c9727647a9a51dc103f8f85eedbf9d71ef5a617c

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmjlkFd:n3C9BRosxW8MFHLMWvli

Malware Config

Targets

    • Target

      f18234443933adce15e6f6e2da6079f0_NeikiAnalytics.exe

    • Size

      115KB

    • MD5

      f18234443933adce15e6f6e2da6079f0

    • SHA1

      97d64734fb634dd258d94a6c824d7d89f98ce797

    • SHA256

      8b161ef64ce1eb10344f968cf23b9a42e605d77c0a3d8fb60094a44ddd5d670a

    • SHA512

      1d1c1802f649c4bd5d69c6716cb03d4309fddf913b119ee544365e37dddb07643ac37bc04bc95e9a5fdcb659c9727647a9a51dc103f8f85eedbf9d71ef5a617c

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmjlkFd:n3C9BRosxW8MFHLMWvli

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks