General

  • Target

    976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe

  • Size

    226KB

  • Sample

    240523-187xbaba78

  • MD5

    976fb1e86e259b0266c23e7d3732e670

  • SHA1

    bccda371d7c0a5ca069cfe4fdffe0d3bd933194a

  • SHA256

    4b1c7d29497e7ab2e2a881366847946511aede2c828046e18d84b1cc5f2b0ffc

  • SHA512

    b600023e4211b85951587a9e6d8d2c7d4527ee720cb4fcfcbabe7cd185b69bf3152e715c7425828e6b02ac24aa175af5fcdda0616bdefd4e3299952e83d10176

  • SSDEEP

    6144:Dcm4FmowdHoSkHcJkkcm4FmowdHoS2qOv7r+MubPtylm:p4wFHoSk0ky4wFHoS2nDr9ubQlm

Malware Config

Targets

    • Target

      976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe

    • Size

      226KB

    • MD5

      976fb1e86e259b0266c23e7d3732e670

    • SHA1

      bccda371d7c0a5ca069cfe4fdffe0d3bd933194a

    • SHA256

      4b1c7d29497e7ab2e2a881366847946511aede2c828046e18d84b1cc5f2b0ffc

    • SHA512

      b600023e4211b85951587a9e6d8d2c7d4527ee720cb4fcfcbabe7cd185b69bf3152e715c7425828e6b02ac24aa175af5fcdda0616bdefd4e3299952e83d10176

    • SSDEEP

      6144:Dcm4FmowdHoSkHcJkkcm4FmowdHoS2qOv7r+MubPtylm:p4wFHoSk0ky4wFHoS2nDr9ubQlm

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks