General

  • Target

    96bc0905892bcf3f3ec38f4c2582db00_NeikiAnalytics.exe

  • Size

    87KB

  • Sample

    240523-16w22aah87

  • MD5

    96bc0905892bcf3f3ec38f4c2582db00

  • SHA1

    7b00fef73384628678d80260a4a47c95538b6dcf

  • SHA256

    bfab7152125d41763aa3d35e617706429eed8efc4e7f8ed1d63a9621550f7e2f

  • SHA512

    d765f2fe08dea6ebcafc95e63d7a169cd29b88b6b407a7e640067bd7b1eccc0a599be0101293e64a66895cab2683f3a392f32fe81d6e0776c632ce36fe299d6b

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3e7I:ymb3NkkiQ3mdBjF+3TU2K3bJZXb

Malware Config

Targets

    • Target

      96bc0905892bcf3f3ec38f4c2582db00_NeikiAnalytics.exe

    • Size

      87KB

    • MD5

      96bc0905892bcf3f3ec38f4c2582db00

    • SHA1

      7b00fef73384628678d80260a4a47c95538b6dcf

    • SHA256

      bfab7152125d41763aa3d35e617706429eed8efc4e7f8ed1d63a9621550f7e2f

    • SHA512

      d765f2fe08dea6ebcafc95e63d7a169cd29b88b6b407a7e640067bd7b1eccc0a599be0101293e64a66895cab2683f3a392f32fe81d6e0776c632ce36fe299d6b

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3e7I:ymb3NkkiQ3mdBjF+3TU2K3bJZXb

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks