General

  • Target

    7d739823add27921c78282dee13b1c30_NeikiAnalytics.exe

  • Size

    89KB

  • Sample

    240523-dgt5tabf74

  • MD5

    7d739823add27921c78282dee13b1c30

  • SHA1

    c4a3992a4f88cb3c011f14dcf47260e3ab881bb1

  • SHA256

    7f63aa0a7e487fd5c8de8fc8930e5d84948f860b2c19d79856d2d867008ef5ee

  • SHA512

    168793631ea2889926b7a3e6542ae2af532057d41e3064bbced89eaa5500cb93e7dce2e5c8af463880c58d64de3311c6f8f27d44b23e2e9210dd2a641e33c123

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDISoFGDvPGB1haZJOzR:ymb3NkkiQ3mdBjFIk7+czE

Malware Config

Targets

    • Target

      7d739823add27921c78282dee13b1c30_NeikiAnalytics.exe

    • Size

      89KB

    • MD5

      7d739823add27921c78282dee13b1c30

    • SHA1

      c4a3992a4f88cb3c011f14dcf47260e3ab881bb1

    • SHA256

      7f63aa0a7e487fd5c8de8fc8930e5d84948f860b2c19d79856d2d867008ef5ee

    • SHA512

      168793631ea2889926b7a3e6542ae2af532057d41e3064bbced89eaa5500cb93e7dce2e5c8af463880c58d64de3311c6f8f27d44b23e2e9210dd2a641e33c123

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDISoFGDvPGB1haZJOzR:ymb3NkkiQ3mdBjFIk7+czE

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks