General

  • Target

    900eae743dbb6c1df10c5abc56304750_NeikiAnalytics.exe

  • Size

    268KB

  • Sample

    240601-graeyacb7s

  • MD5

    900eae743dbb6c1df10c5abc56304750

  • SHA1

    a46063c29cccefa112fd29ea3ccc44f897a08e6e

  • SHA256

    35ee0c1648eec85b559d37a339fe7d9264e9454f6f4e24a5ad4efc5279c10030

  • SHA512

    a3264a53c2086f94868cc33198635050e27d85000effbc34002fe7b3a7bd0de90915eac4502ea4981528b0a0d60fac49c90fe0788c208badff9ca1d999d91d07

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmPzTkV2y/QTa9RBZydZbf83pnzgmmIM3:n3C9BRIG0asYFm71mPfkVB8dKwaWm4R

Malware Config

Targets

    • Target

      900eae743dbb6c1df10c5abc56304750_NeikiAnalytics.exe

    • Size

      268KB

    • MD5

      900eae743dbb6c1df10c5abc56304750

    • SHA1

      a46063c29cccefa112fd29ea3ccc44f897a08e6e

    • SHA256

      35ee0c1648eec85b559d37a339fe7d9264e9454f6f4e24a5ad4efc5279c10030

    • SHA512

      a3264a53c2086f94868cc33198635050e27d85000effbc34002fe7b3a7bd0de90915eac4502ea4981528b0a0d60fac49c90fe0788c208badff9ca1d999d91d07

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmPzTkV2y/QTa9RBZydZbf83pnzgmmIM3:n3C9BRIG0asYFm71mPfkVB8dKwaWm4R

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks