General

  • Target

    224c84fab0c4fbd47bd791c84260e4ce35ed7c9574f9c0a6c19c835915cf3f43_NeikiAnalytics.exe

  • Size

    369KB

  • Sample

    240630-3aetzssbnk

  • MD5

    abfaec01284ea027d5067505a9097e80

  • SHA1

    da3e44bc26d18d8d3185ec3f14961bfafaf9dd5e

  • SHA256

    224c84fab0c4fbd47bd791c84260e4ce35ed7c9574f9c0a6c19c835915cf3f43

  • SHA512

    f4dcb65b140ca70e2355ba4b4ea3a89c23615b502c4027dcaa5b40aa9f41c6c7dc1f0f32b5fd6a507d7e4e30a250aeeb0935e1d214c112ff169e7409409b91af

  • SSDEEP

    3072:ymb3NkkiQ3mdBjFo73tvn+Yp9FrHSwh/c/hdTWGIaxJ8TN005pWmjVwdSsy0V:n3C9BRo7tvnJ9Fywhk/T7xyTpShZVV

Malware Config

Targets

    • Target

      224c84fab0c4fbd47bd791c84260e4ce35ed7c9574f9c0a6c19c835915cf3f43_NeikiAnalytics.exe

    • Size

      369KB

    • MD5

      abfaec01284ea027d5067505a9097e80

    • SHA1

      da3e44bc26d18d8d3185ec3f14961bfafaf9dd5e

    • SHA256

      224c84fab0c4fbd47bd791c84260e4ce35ed7c9574f9c0a6c19c835915cf3f43

    • SHA512

      f4dcb65b140ca70e2355ba4b4ea3a89c23615b502c4027dcaa5b40aa9f41c6c7dc1f0f32b5fd6a507d7e4e30a250aeeb0935e1d214c112ff169e7409409b91af

    • SSDEEP

      3072:ymb3NkkiQ3mdBjFo73tvn+Yp9FrHSwh/c/hdTWGIaxJ8TN005pWmjVwdSsy0V:n3C9BRo7tvnJ9Fywhk/T7xyTpShZVV

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks