General

  • Target

    36f053514147667738bcfa6d3d48a910_NEIKI

  • Size

    68KB

  • Sample

    240507-z3ne2sgb4y

  • MD5

    36f053514147667738bcfa6d3d48a910

  • SHA1

    3924eb86882a70030ef22e9ac3e08dc01c181bb3

  • SHA256

    bfb5b461d77189c56c95a3dc85d27ee4dfba10526be7d2295f7053dd83a9d206

  • SHA512

    f58eceb42bcffb135322cc99277041982e89401e1798cf58df1548c7222eeffe896dfab1c949b8378fbe561fd354203aed56bd57b26fa02092db2cda880db6fe

  • SSDEEP

    768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIDV:BHJaAoHoc2x7bZoYBAcQlwJdM7

Malware Config

Targets

    • Target

      36f053514147667738bcfa6d3d48a910_NEIKI

    • Size

      68KB

    • MD5

      36f053514147667738bcfa6d3d48a910

    • SHA1

      3924eb86882a70030ef22e9ac3e08dc01c181bb3

    • SHA256

      bfb5b461d77189c56c95a3dc85d27ee4dfba10526be7d2295f7053dd83a9d206

    • SHA512

      f58eceb42bcffb135322cc99277041982e89401e1798cf58df1548c7222eeffe896dfab1c949b8378fbe561fd354203aed56bd57b26fa02092db2cda880db6fe

    • SSDEEP

      768:BCB8S+OR7dOahyoHokBtqN74W7bZZmYb9PyzcjRlYlwa6NVdkPnJJMIDV:BHJaAoHoc2x7bZoYBAcQlwJdM7

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks