General

  • Target

    0d52333453b26c3836df031c3a466290_NeikiAnalytics.exe

  • Size

    56KB

  • Sample

    240521-zn3w7aab9y

  • MD5

    0d52333453b26c3836df031c3a466290

  • SHA1

    1b23d6014cfcea6e8b7d460401288cbede3ac845

  • SHA256

    029a9bad5c3dc0e94fce0b37769f14678ec22fb6a5867fa0b39f7728d9115aff

  • SHA512

    5168cf95d801692fa485da4596ba0cd8c4cfd1fb7936e1bcf2519e961df08f3508657c707d59ff0736608ff145ce1abeea27a840cf461e073c5ac27041c27687

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb6tZ9bj2:ymb3NkkiQ3mdBjFIb6tZNy

Malware Config

Targets

    • Target

      0d52333453b26c3836df031c3a466290_NeikiAnalytics.exe

    • Size

      56KB

    • MD5

      0d52333453b26c3836df031c3a466290

    • SHA1

      1b23d6014cfcea6e8b7d460401288cbede3ac845

    • SHA256

      029a9bad5c3dc0e94fce0b37769f14678ec22fb6a5867fa0b39f7728d9115aff

    • SHA512

      5168cf95d801692fa485da4596ba0cd8c4cfd1fb7936e1bcf2519e961df08f3508657c707d59ff0736608ff145ce1abeea27a840cf461e073c5ac27041c27687

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb6tZ9bj2:ymb3NkkiQ3mdBjFIb6tZNy

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks