General

  • Target

    6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe

  • Size

    162KB

  • Sample

    240523-bm46vsgb5x

  • MD5

    6b167f41ac43840e0a28b55aafc60290

  • SHA1

    9bddb7478a121768fcf7baabf113a184289ef225

  • SHA256

    6ec008c04ccaea3281fc97d9a4c0bc8316b0061bf8ace6d2aaf694a80b882ac8

  • SHA512

    2c16ad48c52410d23e50849e5ae7fc5bc26324a8afd5f4d070e0e0119ed5d56aef2511dc6ac7bd2ea915fb2cd5c1b33d1954219348f8ee75b4195e780c8cd029

  • SSDEEP

    3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPDNuBSF:xcm4FmowdHoSgWrXF5lpKGYV0wh6D9F

Malware Config

Targets

    • Target

      6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe

    • Size

      162KB

    • MD5

      6b167f41ac43840e0a28b55aafc60290

    • SHA1

      9bddb7478a121768fcf7baabf113a184289ef225

    • SHA256

      6ec008c04ccaea3281fc97d9a4c0bc8316b0061bf8ace6d2aaf694a80b882ac8

    • SHA512

      2c16ad48c52410d23e50849e5ae7fc5bc26324a8afd5f4d070e0e0119ed5d56aef2511dc6ac7bd2ea915fb2cd5c1b33d1954219348f8ee75b4195e780c8cd029

    • SSDEEP

      3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPDNuBSF:xcm4FmowdHoSgWrXF5lpKGYV0wh6D9F

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks