General

  • Target

    57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe

  • Size

    164KB

  • Sample

    240701-rlxy6awdkc

  • MD5

    48980abad55cb02a25a723a4344d25e0

  • SHA1

    1468663d38d9db614f08dbaae273fb4ea9acfa5e

  • SHA256

    57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e

  • SHA512

    d7b3030bf00bdb8c4138d3641b944230e81f8f90f78c5d909d6f4f65b1de4f8573f5b16612bb3f8c2a966c95b5dbf9cb1fd31abf60de74ecee5af9b49c93c8cb

  • SSDEEP

    3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPJFk:xcm4FmowdHoSgWrXF5lpKGYV0wh6Je

Malware Config

Targets

    • Target

      57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe

    • Size

      164KB

    • MD5

      48980abad55cb02a25a723a4344d25e0

    • SHA1

      1468663d38d9db614f08dbaae273fb4ea9acfa5e

    • SHA256

      57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e

    • SHA512

      d7b3030bf00bdb8c4138d3641b944230e81f8f90f78c5d909d6f4f65b1de4f8573f5b16612bb3f8c2a966c95b5dbf9cb1fd31abf60de74ecee5af9b49c93c8cb

    • SSDEEP

      3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPJFk:xcm4FmowdHoSgWrXF5lpKGYV0wh6Je

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks