General

  • Target

    087cbee36ee27ef5cdd567ed2091eb70_NeikiAnalytics.exe

  • Size

    56KB

  • Sample

    240527-wq65vadg33

  • MD5

    087cbee36ee27ef5cdd567ed2091eb70

  • SHA1

    5bc03c94a5a51ce5697ae08dc4beb9d8447bfb97

  • SHA256

    170926e5859f60c9d2bf5d08c58838b0273ed144c5408d48e04b838c095f083c

  • SHA512

    7d22c49abebb9a50a922ed411f7299e9c54aafd4d935e4c60fcfd3de4874fd7383ae72343caf6b02a5049c46f02ba5992c0440a5547bdb041abc25d520e09f75

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb6tZ9bs+:ymb3NkkiQ3mdBjFIb6tZN/

Malware Config

Targets

    • Target

      087cbee36ee27ef5cdd567ed2091eb70_NeikiAnalytics.exe

    • Size

      56KB

    • MD5

      087cbee36ee27ef5cdd567ed2091eb70

    • SHA1

      5bc03c94a5a51ce5697ae08dc4beb9d8447bfb97

    • SHA256

      170926e5859f60c9d2bf5d08c58838b0273ed144c5408d48e04b838c095f083c

    • SHA512

      7d22c49abebb9a50a922ed411f7299e9c54aafd4d935e4c60fcfd3de4874fd7383ae72343caf6b02a5049c46f02ba5992c0440a5547bdb041abc25d520e09f75

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb6tZ9bs+:ymb3NkkiQ3mdBjFIb6tZN/

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks