General

  • Target

    2e1ffde226bd77ec9eba3629d1c97af0_NeikiAnalytics.exe

  • Size

    231KB

  • Sample

    240604-e9kmhsdd2w

  • MD5

    2e1ffde226bd77ec9eba3629d1c97af0

  • SHA1

    ba8a84dcda0159a0618f82ebcaccab81b4f342cc

  • SHA256

    03fdd8bd5f48fc271bfa9842573c67af6dfa3eb77c262d7439a6eceebb2d1c28

  • SHA512

    8933fe10df0bb97096cdb42dc0cc51fc95977a988e45dc826d6b81ba4f159196b0eda50603c8d9e6ca5ed85a57436213e8071b7d76bdec6e3190294502e97a90

  • SSDEEP

    3072:chOmTsF93UYfwC6GIoutieyhC2lbgGi5yL4:ccm4FmowdHoSi9ER

Malware Config

Targets

    • Target

      2e1ffde226bd77ec9eba3629d1c97af0_NeikiAnalytics.exe

    • Size

      231KB

    • MD5

      2e1ffde226bd77ec9eba3629d1c97af0

    • SHA1

      ba8a84dcda0159a0618f82ebcaccab81b4f342cc

    • SHA256

      03fdd8bd5f48fc271bfa9842573c67af6dfa3eb77c262d7439a6eceebb2d1c28

    • SHA512

      8933fe10df0bb97096cdb42dc0cc51fc95977a988e45dc826d6b81ba4f159196b0eda50603c8d9e6ca5ed85a57436213e8071b7d76bdec6e3190294502e97a90

    • SSDEEP

      3072:chOmTsF93UYfwC6GIoutieyhC2lbgGi5yL4:ccm4FmowdHoSi9ER

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks