General

  • Target

    4edc0530c71ec9256d1c13c3adbe6040882acc6e8d4295af636e3eef9043cc5e_NeikiAnalytics.exe

  • Size

    66KB

  • Sample

    240701-nqkb3sserq

  • MD5

    de25b845c0b60e1cb9916f2770e2d730

  • SHA1

    3d5e1f4c1fd7f6310f719d6533b0594fd51c6b90

  • SHA256

    4edc0530c71ec9256d1c13c3adbe6040882acc6e8d4295af636e3eef9043cc5e

  • SHA512

    319a745c74d71edd036b2927b20bb3fcd4137537af41888a9e26e9fcb6bfdcb5993a6de1e98c03fd3dfc5ddc42dcff14438f3a9df399f7b630c5b48384601808

  • SSDEEP

    1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfUciQ:ymb3NkkiQ3mdBjFI4V4ciQ

Malware Config

Targets

    • Target

      4edc0530c71ec9256d1c13c3adbe6040882acc6e8d4295af636e3eef9043cc5e_NeikiAnalytics.exe

    • Size

      66KB

    • MD5

      de25b845c0b60e1cb9916f2770e2d730

    • SHA1

      3d5e1f4c1fd7f6310f719d6533b0594fd51c6b90

    • SHA256

      4edc0530c71ec9256d1c13c3adbe6040882acc6e8d4295af636e3eef9043cc5e

    • SHA512

      319a745c74d71edd036b2927b20bb3fcd4137537af41888a9e26e9fcb6bfdcb5993a6de1e98c03fd3dfc5ddc42dcff14438f3a9df399f7b630c5b48384601808

    • SSDEEP

      1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfUciQ:ymb3NkkiQ3mdBjFI4V4ciQ

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks