General
-
Target
0b9685b72db7a16761c1f36f501ad360_NEIKI
-
Size
81KB
-
Sample
240508-h93pwabg42
-
MD5
0b9685b72db7a16761c1f36f501ad360
-
SHA1
f003bf78998583c52da37f94c10a0c98c2c4de6f
-
SHA256
5e8d4244ebb254d4f392975f4799153db026290d981544d2f504c372a20ba577
-
SHA512
709926363e1d9b7a8281b0da347ccea820c489e64f3a9845078992f66263c101f130b3f4e0d0bd8a65b1a6d87f58998e3354d4472f0317993eaaf61c855b890d
-
SSDEEP
1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqk:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqk
Static task
static1
Behavioral task
behavioral1
Sample
0b9685b72db7a16761c1f36f501ad360_NEIKI.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b9685b72db7a16761c1f36f501ad360_NEIKI.dll
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
0b9685b72db7a16761c1f36f501ad360_NEIKI
-
Size
81KB
-
MD5
0b9685b72db7a16761c1f36f501ad360
-
SHA1
f003bf78998583c52da37f94c10a0c98c2c4de6f
-
SHA256
5e8d4244ebb254d4f392975f4799153db026290d981544d2f504c372a20ba577
-
SHA512
709926363e1d9b7a8281b0da347ccea820c489e64f3a9845078992f66263c101f130b3f4e0d0bd8a65b1a6d87f58998e3354d4472f0317993eaaf61c855b890d
-
SSDEEP
1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqk:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqk
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1