General

  • Target

    4be3b077b59ef04896f19507e594e4facce7ed4af8ec264daa746a672590edff_NeikiAnalytics

  • Size

    56KB

  • Sample

    240521-pr4yjsea21

  • MD5

    b0a9a55fbebae79c87ac820fc23cc970

  • SHA1

    0034c370f57336bd29b0afbdc9cd4d328e198a55

  • SHA256

    4be3b077b59ef04896f19507e594e4facce7ed4af8ec264daa746a672590edff

  • SHA512

    ab834ec8c469838fbe15955b4d807d2ef9fa6330e6db7eeddd4e7879630f51cbcbbba7aab43acb552c1a1fc9461f7b2dfac69f4427c25f3faa93af344cf103ed

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFeD:ymb3NkkiQ3mdBjFIFeD

Malware Config

Targets

    • Target

      4be3b077b59ef04896f19507e594e4facce7ed4af8ec264daa746a672590edff_NeikiAnalytics

    • Size

      56KB

    • MD5

      b0a9a55fbebae79c87ac820fc23cc970

    • SHA1

      0034c370f57336bd29b0afbdc9cd4d328e198a55

    • SHA256

      4be3b077b59ef04896f19507e594e4facce7ed4af8ec264daa746a672590edff

    • SHA512

      ab834ec8c469838fbe15955b4d807d2ef9fa6330e6db7eeddd4e7879630f51cbcbbba7aab43acb552c1a1fc9461f7b2dfac69f4427c25f3faa93af344cf103ed

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFeD:ymb3NkkiQ3mdBjFIFeD

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks