General
-
Target
9ba479faf2a47f52c24c99d8a891ceb0_NEIKI
-
Size
1.8MB
-
Sample
240508-3jn41sdg2s
-
MD5
9ba479faf2a47f52c24c99d8a891ceb0
-
SHA1
d7be7085197cffb4b1690154dae9ff316234cc11
-
SHA256
aaa2efc7a62c05bf02e552acc63fa28b792a64af9e80466ae43818a1893ba973
-
SHA512
dc9021a4954d532697174dcb9a3406757c03dc82dbe2e448ca745cd45ac4c2a649a84455c0a766cfb1fb1cb992ce35469e093bf14156beb607f8a815048bb726
-
SSDEEP
49152:uhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:ugVTVXYNX9mOWSkM
Behavioral task
behavioral1
Sample
9ba479faf2a47f52c24c99d8a891ceb0_NEIKI.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
9ba479faf2a47f52c24c99d8a891ceb0_NEIKI
-
Size
1.8MB
-
MD5
9ba479faf2a47f52c24c99d8a891ceb0
-
SHA1
d7be7085197cffb4b1690154dae9ff316234cc11
-
SHA256
aaa2efc7a62c05bf02e552acc63fa28b792a64af9e80466ae43818a1893ba973
-
SHA512
dc9021a4954d532697174dcb9a3406757c03dc82dbe2e448ca745cd45ac4c2a649a84455c0a766cfb1fb1cb992ce35469e093bf14156beb607f8a815048bb726
-
SSDEEP
49152:uhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:ugVTVXYNX9mOWSkM
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1