General

  • Target

    64d355e76933bb3bb76b62acc2aff1c0_NEIKI

  • Size

    700KB

  • Sample

    240507-3ef8lsea3v

  • MD5

    64d355e76933bb3bb76b62acc2aff1c0

  • SHA1

    d8c729c2719806273dd2bb3e7ea4fe8d3f779dda

  • SHA256

    acf10f11f16d612bcf2319e14011d49acb34408da6bbd1012c31def535e82977

  • SHA512

    326b4bfd5c6fd775e7edd374396ea9e77a9f9b173d50c12931516afafb8730a93e088bde8a093aebefc153dd0087548cea54b3645fe726f82a469ca34d97f6f8

  • SSDEEP

    6144:41Qv8rK3FQp4LGCr9a9n4FRm6RGMXKqCQFHgTjx1i86JQPDHDdx/Qtqa:lOkiCpat4FU6JXKqFZgl1iPJQPDHvd

Malware Config

Targets

    • Target

      64d355e76933bb3bb76b62acc2aff1c0_NEIKI

    • Size

      700KB

    • MD5

      64d355e76933bb3bb76b62acc2aff1c0

    • SHA1

      d8c729c2719806273dd2bb3e7ea4fe8d3f779dda

    • SHA256

      acf10f11f16d612bcf2319e14011d49acb34408da6bbd1012c31def535e82977

    • SHA512

      326b4bfd5c6fd775e7edd374396ea9e77a9f9b173d50c12931516afafb8730a93e088bde8a093aebefc153dd0087548cea54b3645fe726f82a469ca34d97f6f8

    • SSDEEP

      6144:41Qv8rK3FQp4LGCr9a9n4FRm6RGMXKqCQFHgTjx1i86JQPDHDdx/Qtqa:lOkiCpat4FU6JXKqFZgl1iPJQPDHvd

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks