General

  • Target

    a2765c33db003e552a4a4ac0e20633e0_NeikiAnalytics.exe

  • Size

    64KB

  • Sample

    240524-emjrpsce35

  • MD5

    a2765c33db003e552a4a4ac0e20633e0

  • SHA1

    7c985c7963f690ad78627f0f336d9230b32854ae

  • SHA256

    4f4f10b662ca0c4d539f7935664a1e9b4dcd602126114e85bc0b05092448306e

  • SHA512

    a13f1a3c8a5990c0c29a9acce764dd149bca3ed5dc58b72de2dc663cf2133d35c98388cf089490af9391d3d1d5b0f39f10186f3f094768b978eabc55d2fa491c

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIhJm/wS:ymb3NkkiQ3mdBjFILmD

Malware Config

Targets

    • Target

      a2765c33db003e552a4a4ac0e20633e0_NeikiAnalytics.exe

    • Size

      64KB

    • MD5

      a2765c33db003e552a4a4ac0e20633e0

    • SHA1

      7c985c7963f690ad78627f0f336d9230b32854ae

    • SHA256

      4f4f10b662ca0c4d539f7935664a1e9b4dcd602126114e85bc0b05092448306e

    • SHA512

      a13f1a3c8a5990c0c29a9acce764dd149bca3ed5dc58b72de2dc663cf2133d35c98388cf089490af9391d3d1d5b0f39f10186f3f094768b978eabc55d2fa491c

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIhJm/wS:ymb3NkkiQ3mdBjFILmD

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks