General

  • Target

    3ebb8c9ad53bef12df3229f20966e980_NeikiAnalytics.exe

  • Size

    460KB

  • Sample

    240529-e5hmcsae51

  • MD5

    3ebb8c9ad53bef12df3229f20966e980

  • SHA1

    c1dca3d5ed850330196a7b88792815b2585c7fcd

  • SHA256

    5e923fec1445216235bd39b0151b2b84574b78fbb0bc3f3041a346108bc76c51

  • SHA512

    18280a0263d36fe4a8a6438136e6f65378e102aecd5bb7c2158697f61e22d15e0b6add09d9f8df0979b93687d99073bcb0843add356636ce80f0a7b35f44327d

  • SSDEEP

    6144:n3C9BRo7tvnJ9Fywhk/TJTaYvMmr3C9BRo7tvnJ9Fywhk/Tkuq:n3C9ytvn8whkbJTaFmr3C9ytvn8whkbK

Malware Config

Targets

    • Target

      3ebb8c9ad53bef12df3229f20966e980_NeikiAnalytics.exe

    • Size

      460KB

    • MD5

      3ebb8c9ad53bef12df3229f20966e980

    • SHA1

      c1dca3d5ed850330196a7b88792815b2585c7fcd

    • SHA256

      5e923fec1445216235bd39b0151b2b84574b78fbb0bc3f3041a346108bc76c51

    • SHA512

      18280a0263d36fe4a8a6438136e6f65378e102aecd5bb7c2158697f61e22d15e0b6add09d9f8df0979b93687d99073bcb0843add356636ce80f0a7b35f44327d

    • SSDEEP

      6144:n3C9BRo7tvnJ9Fywhk/TJTaYvMmr3C9BRo7tvnJ9Fywhk/Tkuq:n3C9ytvn8whkbJTaFmr3C9ytvn8whkbK

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks