General

  • Target

    1b7e0e381f92891323a2810dee7a72d9a259d99712b2560396c9445fe1c11685_NeikiAnalytics.exe

  • Size

    141KB

  • Sample

    240620-afdjwsyame

  • MD5

    b9c3f8b4d165297c1e867d84b6105ab0

  • SHA1

    0e44379221fefcde378043fb4bb9b73b99fcb8f1

  • SHA256

    1b7e0e381f92891323a2810dee7a72d9a259d99712b2560396c9445fe1c11685

  • SHA512

    3e521bd9341b41b70e075c2873c95837485c2a18b47c1a0124c2066a3b35b7f069f9829d13a78f9b3e3c910168e3b151d06bddd92d6354fc6b68e6a77686752d

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFomR7UsyJC+n0Gsgyek1NC:n3C9BRomRph+0GsgyeYg

Malware Config

Targets

    • Target

      1b7e0e381f92891323a2810dee7a72d9a259d99712b2560396c9445fe1c11685_NeikiAnalytics.exe

    • Size

      141KB

    • MD5

      b9c3f8b4d165297c1e867d84b6105ab0

    • SHA1

      0e44379221fefcde378043fb4bb9b73b99fcb8f1

    • SHA256

      1b7e0e381f92891323a2810dee7a72d9a259d99712b2560396c9445fe1c11685

    • SHA512

      3e521bd9341b41b70e075c2873c95837485c2a18b47c1a0124c2066a3b35b7f069f9829d13a78f9b3e3c910168e3b151d06bddd92d6354fc6b68e6a77686752d

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFomR7UsyJC+n0Gsgyek1NC:n3C9BRomRph+0GsgyeYg

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks