General

  • Target

    0bf85f34e230e5ee5c18a7ad37f42440_NeikiAnalytics.exe

  • Size

    71KB

  • Sample

    240525-f4qf9afg47

  • MD5

    0bf85f34e230e5ee5c18a7ad37f42440

  • SHA1

    c9d3c8fb9e9c85dbd73dd1a68961fa813548731d

  • SHA256

    1f009b5cf965ed2aa81a1a733317173d195346de000fd10e78e9bb721ad6f22e

  • SHA512

    2c12d44c3d43ecef70d88322895cc20ef5f277183eca99778f6a31f5dacfd9345db73a24b6f2bd02b879c2fa75b6e2bd144522d3669d5add7515222fda09718b

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb7tAHEqSCkKWSp:ymb3NkkiQ3mdBjFIynIKp

Malware Config

Targets

    • Target

      0bf85f34e230e5ee5c18a7ad37f42440_NeikiAnalytics.exe

    • Size

      71KB

    • MD5

      0bf85f34e230e5ee5c18a7ad37f42440

    • SHA1

      c9d3c8fb9e9c85dbd73dd1a68961fa813548731d

    • SHA256

      1f009b5cf965ed2aa81a1a733317173d195346de000fd10e78e9bb721ad6f22e

    • SHA512

      2c12d44c3d43ecef70d88322895cc20ef5f277183eca99778f6a31f5dacfd9345db73a24b6f2bd02b879c2fa75b6e2bd144522d3669d5add7515222fda09718b

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb7tAHEqSCkKWSp:ymb3NkkiQ3mdBjFIynIKp

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks