General

  • Target

    51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe

  • Size

    490KB

  • Sample

    240701-phfjla1ekh

  • MD5

    37e987ffea04fe20d32c1e84786951a0

  • SHA1

    7d1f3cc72269f3a10e34e64958bb45bcd5efd943

  • SHA256

    51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68

  • SHA512

    602ce8b0c832b8c5cf72ce551d93a9d3bb31548afa0fd8be58cef8b2e225b2fce8ed00a0ad52e748d84e36be7f4a502d42c0884767ad62c6afd3b36dfdaf24c3

  • SSDEEP

    6144:n3C9BRo7tvnJ9oH0IRgZvjkUo7tvnJ9oH0IiVByq9CPobNVtg:n3C9ytvngQjgtvngSV3CPobNVtg

Malware Config

Targets

    • Target

      51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe

    • Size

      490KB

    • MD5

      37e987ffea04fe20d32c1e84786951a0

    • SHA1

      7d1f3cc72269f3a10e34e64958bb45bcd5efd943

    • SHA256

      51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68

    • SHA512

      602ce8b0c832b8c5cf72ce551d93a9d3bb31548afa0fd8be58cef8b2e225b2fce8ed00a0ad52e748d84e36be7f4a502d42c0884767ad62c6afd3b36dfdaf24c3

    • SSDEEP

      6144:n3C9BRo7tvnJ9oH0IRgZvjkUo7tvnJ9oH0IiVByq9CPobNVtg:n3C9ytvngQjgtvngSV3CPobNVtg

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks