General

  • Target

    3c493674068d0af156602861c20661c0_NeikiAnalytics.exe

  • Size

    153KB

  • Sample

    240528-kxg9hsed79

  • MD5

    3c493674068d0af156602861c20661c0

  • SHA1

    f3ba9f6a2d77f52bc69a40b531f4b473583d3c69

  • SHA256

    e04a147d4176fb7637c7ffd8b5c260818b4f65b0cc3b75a4b1e5bddb3e3d51c1

  • SHA512

    5e5bcf9018f67caf96d044a29a4a24997ac414dc25af9631172805ae4a37230ba0a192f50d8e76a44853337e3859d985eac45d3815ef23007865d02a48b878dd

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmX5k2LrCimBaH8UH303g:n3C9BRIG0asYFm71mJkzpaH8m37

Malware Config

Targets

    • Target

      3c493674068d0af156602861c20661c0_NeikiAnalytics.exe

    • Size

      153KB

    • MD5

      3c493674068d0af156602861c20661c0

    • SHA1

      f3ba9f6a2d77f52bc69a40b531f4b473583d3c69

    • SHA256

      e04a147d4176fb7637c7ffd8b5c260818b4f65b0cc3b75a4b1e5bddb3e3d51c1

    • SHA512

      5e5bcf9018f67caf96d044a29a4a24997ac414dc25af9631172805ae4a37230ba0a192f50d8e76a44853337e3859d985eac45d3815ef23007865d02a48b878dd

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmX5k2LrCimBaH8UH303g:n3C9BRIG0asYFm71mJkzpaH8m37

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks