General

  • Target

    47a611a6179a1a1cf8a30bc02b20cad0_NeikiAnalytics.exe

  • Size

    328KB

  • Sample

    240523-mw51asdf63

  • MD5

    47a611a6179a1a1cf8a30bc02b20cad0

  • SHA1

    e53be27e43cf6d5632a9633ae87583fb524fc173

  • SHA256

    0ac2d2b89bff167b4323ecd3ae7b7cd48e9372187c92d66bd32100c1a365708e

  • SHA512

    8adf55dd97589c3c49afa57b088ad06153ede82c3c7505f3867a725a1ae8d0d60438e36424e1e3dc98ab58d1884e879dbe61f70d838bf527d05111c2c4d8dd78

  • SSDEEP

    6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeR:R4wFHoSHYHUrAwfMp3CDR

Malware Config

Targets

    • Target

      47a611a6179a1a1cf8a30bc02b20cad0_NeikiAnalytics.exe

    • Size

      328KB

    • MD5

      47a611a6179a1a1cf8a30bc02b20cad0

    • SHA1

      e53be27e43cf6d5632a9633ae87583fb524fc173

    • SHA256

      0ac2d2b89bff167b4323ecd3ae7b7cd48e9372187c92d66bd32100c1a365708e

    • SHA512

      8adf55dd97589c3c49afa57b088ad06153ede82c3c7505f3867a725a1ae8d0d60438e36424e1e3dc98ab58d1884e879dbe61f70d838bf527d05111c2c4d8dd78

    • SSDEEP

      6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeR:R4wFHoSHYHUrAwfMp3CDR

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks