General

  • Target

    58ed7b6f646ffc0338430c92a90bc8c8c04d3bf5981c3c2493f8ac5412475d2c_NeikiAnalytics

  • Size

    54KB

  • Sample

    240521-q4hrhsga88

  • MD5

    e1ba42173b0e44b27904fa6dfafc7900

  • SHA1

    22e94519aac6cfaa94bd2300c5121c8e96e1b4a8

  • SHA256

    58ed7b6f646ffc0338430c92a90bc8c8c04d3bf5981c3c2493f8ac5412475d2c

  • SHA512

    09c409ffaadc5317a779008eeb50ef6c139b33318612c5f6b10467d12907d8ba5d5d8c8f6346f5ed52f1221ab572c84d0d7775e3bab897430592497c9f5d8c4a

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIF5:ymb3NkkiQ3mdBjFIF5

Malware Config

Targets

    • Target

      58ed7b6f646ffc0338430c92a90bc8c8c04d3bf5981c3c2493f8ac5412475d2c_NeikiAnalytics

    • Size

      54KB

    • MD5

      e1ba42173b0e44b27904fa6dfafc7900

    • SHA1

      22e94519aac6cfaa94bd2300c5121c8e96e1b4a8

    • SHA256

      58ed7b6f646ffc0338430c92a90bc8c8c04d3bf5981c3c2493f8ac5412475d2c

    • SHA512

      09c409ffaadc5317a779008eeb50ef6c139b33318612c5f6b10467d12907d8ba5d5d8c8f6346f5ed52f1221ab572c84d0d7775e3bab897430592497c9f5d8c4a

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIF5:ymb3NkkiQ3mdBjFIF5

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks