General

  • Target

    a4a266823083795761c6d9c09e544530_NeikiAnalytics.exe

  • Size

    92KB

  • Sample

    240603-qg979aha63

  • MD5

    a4a266823083795761c6d9c09e544530

  • SHA1

    c035c272b9f69efd63f9330df684f779563fdd0c

  • SHA256

    fabbe8224cc3b9c5999fc709f2b5585bc55aab3c4a2ae8e46eae7c7af6c0a5bd

  • SHA512

    ded4d0497bc53b63b285ed700f29abcface698792ab04b7ed11b14da4c7cc7efde39a2a00c7ec36500ad76dd190781aa072dc5fb31143e37a62f8926a5fa6ecf

  • SSDEEP

    1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpWe:8hOmTsF93UYfwC6GIout0fmCiiiXA6mZ

Malware Config

Targets

    • Target

      a4a266823083795761c6d9c09e544530_NeikiAnalytics.exe

    • Size

      92KB

    • MD5

      a4a266823083795761c6d9c09e544530

    • SHA1

      c035c272b9f69efd63f9330df684f779563fdd0c

    • SHA256

      fabbe8224cc3b9c5999fc709f2b5585bc55aab3c4a2ae8e46eae7c7af6c0a5bd

    • SHA512

      ded4d0497bc53b63b285ed700f29abcface698792ab04b7ed11b14da4c7cc7efde39a2a00c7ec36500ad76dd190781aa072dc5fb31143e37a62f8926a5fa6ecf

    • SSDEEP

      1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpWe:8hOmTsF93UYfwC6GIout0fmCiiiXA6mZ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks