General

  • Target

    03acf28e8e41b1c27012c5962d75dccd80d1ceec413fcf2ffb969ee7fbc97c00_NeikiAnalytics.exe

  • Size

    124KB

  • Sample

    240621-ssc31avhqa

  • MD5

    b80d59e018d24cd8f40efcb80d8e6f30

  • SHA1

    026393829419c7c17ce157314ca2e817e4406ef0

  • SHA256

    03acf28e8e41b1c27012c5962d75dccd80d1ceec413fcf2ffb969ee7fbc97c00

  • SHA512

    81fc621edc2fe23a4ccac49bbdf413f9e7b841378ab4f56dc84f70f07eb8fdf8bf15bc76fc48c48ca6747de125e16851dbb411226182e7698252cfa8b5cb8eef

  • SSDEEP

    3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4JgY0nUX:9cm4FmowdHoS49oUX

Malware Config

Targets

    • Target

      03acf28e8e41b1c27012c5962d75dccd80d1ceec413fcf2ffb969ee7fbc97c00_NeikiAnalytics.exe

    • Size

      124KB

    • MD5

      b80d59e018d24cd8f40efcb80d8e6f30

    • SHA1

      026393829419c7c17ce157314ca2e817e4406ef0

    • SHA256

      03acf28e8e41b1c27012c5962d75dccd80d1ceec413fcf2ffb969ee7fbc97c00

    • SHA512

      81fc621edc2fe23a4ccac49bbdf413f9e7b841378ab4f56dc84f70f07eb8fdf8bf15bc76fc48c48ca6747de125e16851dbb411226182e7698252cfa8b5cb8eef

    • SSDEEP

      3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4JgY0nUX:9cm4FmowdHoS49oUX

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks