General

  • Target

    4fbe07cb49394aee2e15a9e8dcc07520_NeikiAnalytics.exe

  • Size

    93KB

  • Sample

    240529-lqklqsbb75

  • MD5

    4fbe07cb49394aee2e15a9e8dcc07520

  • SHA1

    f135d518014f728e7790666270efc61f4ba44238

  • SHA256

    40bf2514d30d36c4a1945133a71bc7fb0506c1625c3e7ccfd311b7522d4490ef

  • SHA512

    77cfcbd89fee6b86f3fc13064931df6b1692a82b2945c6b98c7002b523e95439b6e877b4b8f840485e307eac10f8564b4527295d81bd6e795a8ec25e3ae32206

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWp8z:8hOmTsF93UYfwC6GIout0fmCiiiXA6m+

Malware Config

Targets

    • Target

      4fbe07cb49394aee2e15a9e8dcc07520_NeikiAnalytics.exe

    • Size

      93KB

    • MD5

      4fbe07cb49394aee2e15a9e8dcc07520

    • SHA1

      f135d518014f728e7790666270efc61f4ba44238

    • SHA256

      40bf2514d30d36c4a1945133a71bc7fb0506c1625c3e7ccfd311b7522d4490ef

    • SHA512

      77cfcbd89fee6b86f3fc13064931df6b1692a82b2945c6b98c7002b523e95439b6e877b4b8f840485e307eac10f8564b4527295d81bd6e795a8ec25e3ae32206

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWp8z:8hOmTsF93UYfwC6GIout0fmCiiiXA6m+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks