General

  • Target

    1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe

  • Size

    234KB

  • Sample

    240630-1nfx4awgjb

  • MD5

    6186641f31b66060ed80257a9e30ec90

  • SHA1

    e53f3be89641de8cacf5f27e05e7899e4775be11

  • SHA256

    1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54

  • SHA512

    ca33f9a18c3bc47e6158d6233192b930d01e60201aac229f44fc4ac22e204ddc5efc75071be859e0001254b3b549e24282730a97d1e54496009cc8bd88b682da

  • SSDEEP

    6144:kcm4FmowdHoSSGpJw4PqhraHcpOmFTHDGYhEf5X2aD:y4wFHoSSGpJwGeeFmFTNAp2+

Malware Config

Targets

    • Target

      1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe

    • Size

      234KB

    • MD5

      6186641f31b66060ed80257a9e30ec90

    • SHA1

      e53f3be89641de8cacf5f27e05e7899e4775be11

    • SHA256

      1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54

    • SHA512

      ca33f9a18c3bc47e6158d6233192b930d01e60201aac229f44fc4ac22e204ddc5efc75071be859e0001254b3b549e24282730a97d1e54496009cc8bd88b682da

    • SSDEEP

      6144:kcm4FmowdHoSSGpJw4PqhraHcpOmFTHDGYhEf5X2aD:y4wFHoSSGpJwGeeFmFTNAp2+

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks