General

  • Target

    4590bb25a7237a02257b8f4ca2a8a400_NeikiAnalytics.exe

  • Size

    280KB

  • Sample

    240522-1srkdsad72

  • MD5

    4590bb25a7237a02257b8f4ca2a8a400

  • SHA1

    73879deb632b74f5d3644025cd43c9f6ba785e5c

  • SHA256

    c105ef135e533b9013c7882d8e7f9fcd9a092ab35fc10240a8d1c216c625bce1

  • SHA512

    6834272e67d8ebe2debe3385283600752739a54d57934b6f06ed4329f1eb54595ed4bb642b946ea3999c910b72a730cec05bd3ef77a8d75273db0b1f3dc9050a

  • SSDEEP

    3072:LhOmTsF93UYfwC6GIoutVwT0JOfZKldUIbvpynrSPu/+//uGF:Lcm4FmowdHoSVwT+aZKlumArSPBXuGF

Malware Config

Targets

    • Target

      4590bb25a7237a02257b8f4ca2a8a400_NeikiAnalytics.exe

    • Size

      280KB

    • MD5

      4590bb25a7237a02257b8f4ca2a8a400

    • SHA1

      73879deb632b74f5d3644025cd43c9f6ba785e5c

    • SHA256

      c105ef135e533b9013c7882d8e7f9fcd9a092ab35fc10240a8d1c216c625bce1

    • SHA512

      6834272e67d8ebe2debe3385283600752739a54d57934b6f06ed4329f1eb54595ed4bb642b946ea3999c910b72a730cec05bd3ef77a8d75273db0b1f3dc9050a

    • SSDEEP

      3072:LhOmTsF93UYfwC6GIoutVwT0JOfZKldUIbvpynrSPu/+//uGF:Lcm4FmowdHoSVwT+aZKlumArSPBXuGF

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks