General

  • Target

    1279219da5e932773ca9c7700b9e5120_NeikiAnalytics.exe

  • Size

    77KB

  • Sample

    240522-arzlhaeh2z

  • MD5

    1279219da5e932773ca9c7700b9e5120

  • SHA1

    b6a384a64f7e98e6d7bf3e53caf7683e64bc9c51

  • SHA256

    23b620fe474bbfff2e3ca855052e8cc4cea83cdfae7ae47d63be29ea3a4ad8cd

  • SHA512

    ae19b7c4d188c53d87e30ae8f3b3a3cfe99d2e9f758da6301f7f35325b51274a344cc4616d95e235ba081948bc7b059604b6e05d2042cf5190c6c3ee5a577ec5

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgJb31HgxGc+gmvZQCM:ymb3NkkiQ3mdBjFIUb31HgxL+gmvZjM

Malware Config

Targets

    • Target

      1279219da5e932773ca9c7700b9e5120_NeikiAnalytics.exe

    • Size

      77KB

    • MD5

      1279219da5e932773ca9c7700b9e5120

    • SHA1

      b6a384a64f7e98e6d7bf3e53caf7683e64bc9c51

    • SHA256

      23b620fe474bbfff2e3ca855052e8cc4cea83cdfae7ae47d63be29ea3a4ad8cd

    • SHA512

      ae19b7c4d188c53d87e30ae8f3b3a3cfe99d2e9f758da6301f7f35325b51274a344cc4616d95e235ba081948bc7b059604b6e05d2042cf5190c6c3ee5a577ec5

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgJb31HgxGc+gmvZQCM:ymb3NkkiQ3mdBjFIUb31HgxL+gmvZjM

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks