General

  • Target

    8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe

  • Size

    226KB

  • Sample

    240523-1dd1rahd71

  • MD5

    8e5f450f54cc322b8aec4108765c1520

  • SHA1

    0cd36872a052883ef67ee51c06945aedf5325a1f

  • SHA256

    bca8d2d402ca1c2d3abefcba1c8aeabb14c284656ec5d8a37a9a77f12a1633db

  • SHA512

    ce80de7713f4b15fced06b1d8f36adec3b0d3e2f4cd20a466292be7c3f36ae77910cc202baec9590af2fe53a06af967c5f75085ebde8a5739d3239effce98a35

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeGb:n3C9BRo7MlrWKo+lxKF

Malware Config

Targets

    • Target

      8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe

    • Size

      226KB

    • MD5

      8e5f450f54cc322b8aec4108765c1520

    • SHA1

      0cd36872a052883ef67ee51c06945aedf5325a1f

    • SHA256

      bca8d2d402ca1c2d3abefcba1c8aeabb14c284656ec5d8a37a9a77f12a1633db

    • SHA512

      ce80de7713f4b15fced06b1d8f36adec3b0d3e2f4cd20a466292be7c3f36ae77910cc202baec9590af2fe53a06af967c5f75085ebde8a5739d3239effce98a35

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeGb:n3C9BRo7MlrWKo+lxKF

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks