General

  • Target

    33095629e9f91950cf77ecfe37f3acb0_NeikiAnalytics.exe

  • Size

    165KB

  • Sample

    240522-qp978adb3w

  • MD5

    33095629e9f91950cf77ecfe37f3acb0

  • SHA1

    9917e5ae7cc441f47e74c54161a26c2bda21569e

  • SHA256

    2d3bebfc9a62c07fa6d19ff639bb3ddb5a281c86f48302eb4c7ffc34d070d8b8

  • SHA512

    5b63f5e447ab90b6e25aec49452401774df7251191c9952ed94d399226d883f43a779f89b5ccdfcc778db8c4e2b81e773bcdc94ac9fbb77a0e35b062355c8176

  • SSDEEP

    3072:khOmTsF93UYfwC6GIoutpYcvrqrE66kropO6BWlPFH4t6NDWOH148BH15vy:kcm4FmowdHoSphraHcpOFltH4ttj8BHu

Malware Config

Targets

    • Target

      33095629e9f91950cf77ecfe37f3acb0_NeikiAnalytics.exe

    • Size

      165KB

    • MD5

      33095629e9f91950cf77ecfe37f3acb0

    • SHA1

      9917e5ae7cc441f47e74c54161a26c2bda21569e

    • SHA256

      2d3bebfc9a62c07fa6d19ff639bb3ddb5a281c86f48302eb4c7ffc34d070d8b8

    • SHA512

      5b63f5e447ab90b6e25aec49452401774df7251191c9952ed94d399226d883f43a779f89b5ccdfcc778db8c4e2b81e773bcdc94ac9fbb77a0e35b062355c8176

    • SSDEEP

      3072:khOmTsF93UYfwC6GIoutpYcvrqrE66kropO6BWlPFH4t6NDWOH148BH15vy:kcm4FmowdHoSphraHcpOFltH4ttj8BHu

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks