General

  • Target

    0eea8a11b1dc49502b536e82907e77811ae6c4e53f830b4d7bd9a8365b414525_NeikiAnalytics

  • Size

    144KB

  • Sample

    240521-g5eltabc3t

  • MD5

    eb54c2e8c1a324662805d577227c67e0

  • SHA1

    54ea23bf8c8a592574031386f0832fc56d6f2b0c

  • SHA256

    0eea8a11b1dc49502b536e82907e77811ae6c4e53f830b4d7bd9a8365b414525

  • SHA512

    19a9ac63579a5f4fa8edeb503bcae90a42ebf19ee183a8d4b9ecfe6b0328d930407e272e019dc47d0e9c8698dc640d90ac7c29eeb2eed2688e3057ccabd17b32

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQg:n3C9BRosxW8MFHLMW7Qg

Malware Config

Targets

    • Target

      0eea8a11b1dc49502b536e82907e77811ae6c4e53f830b4d7bd9a8365b414525_NeikiAnalytics

    • Size

      144KB

    • MD5

      eb54c2e8c1a324662805d577227c67e0

    • SHA1

      54ea23bf8c8a592574031386f0832fc56d6f2b0c

    • SHA256

      0eea8a11b1dc49502b536e82907e77811ae6c4e53f830b4d7bd9a8365b414525

    • SHA512

      19a9ac63579a5f4fa8edeb503bcae90a42ebf19ee183a8d4b9ecfe6b0328d930407e272e019dc47d0e9c8698dc640d90ac7c29eeb2eed2688e3057ccabd17b32

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQg:n3C9BRosxW8MFHLMW7Qg

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks