General

  • Target

    4f7143f94a9da9575d1f55b80629809abd27de639e899bb8edbc041981a59f37_NeikiAnalytics

  • Size

    66KB

  • Sample

    240521-p5r6xaee56

  • MD5

    e771e29e516cec7e1e32be8f482ca320

  • SHA1

    4e631579e48a145d26800cf82a484c1e1e7642fe

  • SHA256

    4f7143f94a9da9575d1f55b80629809abd27de639e899bb8edbc041981a59f37

  • SHA512

    4ab348c94005d2c3cc2ebae6fadb56d4855646787e370ec506e8d327e9714105533b43aa471a6d99907d6bb8d85d0901eec0a5a39af8337c8b7ca41f415425c0

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJUDbAIw:ymb3NkkiQ3mdBjFIFdJ8bm

Malware Config

Targets

    • Target

      4f7143f94a9da9575d1f55b80629809abd27de639e899bb8edbc041981a59f37_NeikiAnalytics

    • Size

      66KB

    • MD5

      e771e29e516cec7e1e32be8f482ca320

    • SHA1

      4e631579e48a145d26800cf82a484c1e1e7642fe

    • SHA256

      4f7143f94a9da9575d1f55b80629809abd27de639e899bb8edbc041981a59f37

    • SHA512

      4ab348c94005d2c3cc2ebae6fadb56d4855646787e370ec506e8d327e9714105533b43aa471a6d99907d6bb8d85d0901eec0a5a39af8337c8b7ca41f415425c0

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJUDbAIw:ymb3NkkiQ3mdBjFIFdJ8bm

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks