General

  • Target

    95f4fbb14f74416c5a6122307856ce20_NeikiAnalytics.exe

  • Size

    116KB

  • Sample

    240523-14aq1sah4t

  • MD5

    95f4fbb14f74416c5a6122307856ce20

  • SHA1

    4cdae1fc6618fe308947961d98a81bc83264d25b

  • SHA256

    c2357813bfcd21b85bbcba033e3169f5bfcfdde3619f4da1d11391a21ca40453

  • SHA512

    848966083dbd4dee6718f62fd71ffc76bf9efa7eb961b6e46948f871632992481f5ac3eb273031c3e41d42b76f46211bd6b50f9aeac56dac836452e90e500ba7

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmjlkF8:n3C9BRosxW8MFHLMWvlX

Malware Config

Targets

    • Target

      95f4fbb14f74416c5a6122307856ce20_NeikiAnalytics.exe

    • Size

      116KB

    • MD5

      95f4fbb14f74416c5a6122307856ce20

    • SHA1

      4cdae1fc6618fe308947961d98a81bc83264d25b

    • SHA256

      c2357813bfcd21b85bbcba033e3169f5bfcfdde3619f4da1d11391a21ca40453

    • SHA512

      848966083dbd4dee6718f62fd71ffc76bf9efa7eb961b6e46948f871632992481f5ac3eb273031c3e41d42b76f46211bd6b50f9aeac56dac836452e90e500ba7

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmjlkF8:n3C9BRosxW8MFHLMWvlX

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks