General

  • Target

    a27f351380b281a64a4671b63269d400_NeikiAnalytics.exe

  • Size

    64KB

  • Sample

    240524-emllasce38

  • MD5

    a27f351380b281a64a4671b63269d400

  • SHA1

    d26caabfb8624f5321d245cbf3eda43cd0deb16f

  • SHA256

    819312ea253ce209fc8caee362007a257bdcad25cff3178ee65e849344b8a276

  • SHA512

    f8bdda8388a56b0e1c2e89ca14f806c7f12714e0e9b8d9340f90977fdb5ede7228b80667fb7a68bbf432b07e08d78399351b2334e716de925639e9f7710ccc46

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfO:ymb3NkkiQ3mdBjFI4VK

Malware Config

Targets

    • Target

      a27f351380b281a64a4671b63269d400_NeikiAnalytics.exe

    • Size

      64KB

    • MD5

      a27f351380b281a64a4671b63269d400

    • SHA1

      d26caabfb8624f5321d245cbf3eda43cd0deb16f

    • SHA256

      819312ea253ce209fc8caee362007a257bdcad25cff3178ee65e849344b8a276

    • SHA512

      f8bdda8388a56b0e1c2e89ca14f806c7f12714e0e9b8d9340f90977fdb5ede7228b80667fb7a68bbf432b07e08d78399351b2334e716de925639e9f7710ccc46

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfO:ymb3NkkiQ3mdBjFI4VK

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks