General

  • Target

    08cf870dff8ab5b94798450629194b00_NeikiAnalytics.exe

  • Size

    69KB

  • Sample

    240521-ysxqasgg78

  • MD5

    08cf870dff8ab5b94798450629194b00

  • SHA1

    b3aca8725ecd97e93b671baca07d63d4f9ddfdbc

  • SHA256

    f32705db5b7b830938af02f25dad0602d65c0b3cb121576181e9ebecb6abb09f

  • SHA512

    47f4f32472b400415a734c14969f381d4297b9e1dd129ac9722ac1089f95d95e4bff307f03d7a8a9fb942fba1244f4288f317c70883c68b97ff82f37a1dafabd

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUwcsbY3Z:ymb3NkkiQ3mdBjF0yjcsMp

Malware Config

Targets

    • Target

      08cf870dff8ab5b94798450629194b00_NeikiAnalytics.exe

    • Size

      69KB

    • MD5

      08cf870dff8ab5b94798450629194b00

    • SHA1

      b3aca8725ecd97e93b671baca07d63d4f9ddfdbc

    • SHA256

      f32705db5b7b830938af02f25dad0602d65c0b3cb121576181e9ebecb6abb09f

    • SHA512

      47f4f32472b400415a734c14969f381d4297b9e1dd129ac9722ac1089f95d95e4bff307f03d7a8a9fb942fba1244f4288f317c70883c68b97ff82f37a1dafabd

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUwcsbY3Z:ymb3NkkiQ3mdBjF0yjcsMp

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks