General

  • Target

    c12fda9926f0e2b10e2c9113a53b0a20_NeikiAnalytics.exe

  • Size

    102KB

  • Sample

    240615-21vsfsybne

  • MD5

    c12fda9926f0e2b10e2c9113a53b0a20

  • SHA1

    abed765dd478f3bf176dbe92d69149a23f7e032d

  • SHA256

    e0573651acf313ea11b53aee933b556a62068ad32668e8ac15d0d84ebfe12e89

  • SHA512

    7609aa3213b7b3192bb23ae2ee39bc6216ac090cd8483d9d47d980ee69ccd3f21fe8da725aed6923ced1f9f1e93a9837831a02310d207cb84db60444d5e480f1

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73PYP1lri3KVT+buwUGu3P3Cai:n3C9BRo7MlrWKVT+buBGu3Pe

Malware Config

Targets

    • Target

      c12fda9926f0e2b10e2c9113a53b0a20_NeikiAnalytics.exe

    • Size

      102KB

    • MD5

      c12fda9926f0e2b10e2c9113a53b0a20

    • SHA1

      abed765dd478f3bf176dbe92d69149a23f7e032d

    • SHA256

      e0573651acf313ea11b53aee933b556a62068ad32668e8ac15d0d84ebfe12e89

    • SHA512

      7609aa3213b7b3192bb23ae2ee39bc6216ac090cd8483d9d47d980ee69ccd3f21fe8da725aed6923ced1f9f1e93a9837831a02310d207cb84db60444d5e480f1

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73PYP1lri3KVT+buwUGu3P3Cai:n3C9BRo7MlrWKVT+buBGu3Pe

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks