General

  • Target

    59683eb4e20a5e9cc34b5a6e73bab890_NeikiAnalytics.exe

  • Size

    443KB

  • Sample

    240529-2x79daea47

  • MD5

    59683eb4e20a5e9cc34b5a6e73bab890

  • SHA1

    44de35f12505c2a7a3a03184ae2b26cb6aa4b014

  • SHA256

    ab5044ad07b931843b970a2640ecb9a8c65e1cfe16a1dfefa53c0bde34190af6

  • SHA512

    e7d262363d694d45a4990a61782616d514c7fafed8a332d78c7d2d56dd51282c28a8214fd2665f55c5880307ca113331f9cf044b1b3366ab5b1d58cf2f2a6432

  • SSDEEP

    6144:n3C9BRo7tvnJ9Fywhk/T4i37K3BoKg0p5WI09J8:n3C9ytvn8whkb4i3e3GFO6J8

Malware Config

Targets

    • Target

      59683eb4e20a5e9cc34b5a6e73bab890_NeikiAnalytics.exe

    • Size

      443KB

    • MD5

      59683eb4e20a5e9cc34b5a6e73bab890

    • SHA1

      44de35f12505c2a7a3a03184ae2b26cb6aa4b014

    • SHA256

      ab5044ad07b931843b970a2640ecb9a8c65e1cfe16a1dfefa53c0bde34190af6

    • SHA512

      e7d262363d694d45a4990a61782616d514c7fafed8a332d78c7d2d56dd51282c28a8214fd2665f55c5880307ca113331f9cf044b1b3366ab5b1d58cf2f2a6432

    • SSDEEP

      6144:n3C9BRo7tvnJ9Fywhk/T4i37K3BoKg0p5WI09J8:n3C9ytvn8whkb4i3e3GFO6J8

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks