General

  • Target

    832fa94d0295471aa27c9de0920dcad0_NeikiAnalytics.exe

  • Size

    71KB

  • Sample

    240531-2xg27agf5z

  • MD5

    832fa94d0295471aa27c9de0920dcad0

  • SHA1

    14f22152dd6f12d8976efb957cccd61f030c09da

  • SHA256

    be7fc41357a7cce1659f787a9d17bac9a5a7290eaca2d3b779fa1ee9947445d6

  • SHA512

    c499a68a8780d97b042b222322d176efb8460007829d703d4e31df749fee2f8fcda53ab3a8e9bfb4b51e3f16a8bb3b6208f5585dcb0582b759164c5ebc6976dd

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb7GTi3ldf:ymb3NkkiQ3mdBjFIWY1

Malware Config

Targets

    • Target

      832fa94d0295471aa27c9de0920dcad0_NeikiAnalytics.exe

    • Size

      71KB

    • MD5

      832fa94d0295471aa27c9de0920dcad0

    • SHA1

      14f22152dd6f12d8976efb957cccd61f030c09da

    • SHA256

      be7fc41357a7cce1659f787a9d17bac9a5a7290eaca2d3b779fa1ee9947445d6

    • SHA512

      c499a68a8780d97b042b222322d176efb8460007829d703d4e31df749fee2f8fcda53ab3a8e9bfb4b51e3f16a8bb3b6208f5585dcb0582b759164c5ebc6976dd

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb7GTi3ldf:ymb3NkkiQ3mdBjFIWY1

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks