General

  • Target

    fc323fccc3fe1289037d54448dd73ee0_NEIKI

  • Size

    110KB

  • Sample

    240508-tfelqseg85

  • MD5

    fc323fccc3fe1289037d54448dd73ee0

  • SHA1

    32665d195b229320a6af56a2d5e792a24937e01b

  • SHA256

    cd6c53a7b02876dd4000b8a7f2bc65ec8bdef5478ec55ef0e727fd9d76799688

  • SHA512

    dc9d4ef4ad582a36e19260b1431c7dcdc8896adce7375054aa79b92ecf378bcf8e493e101b897950e1ea05d78dec303e3f8bb0b697465087f0ef616383fc200c

  • SSDEEP

    1536:aiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:aiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      fc323fccc3fe1289037d54448dd73ee0_NEIKI

    • Size

      110KB

    • MD5

      fc323fccc3fe1289037d54448dd73ee0

    • SHA1

      32665d195b229320a6af56a2d5e792a24937e01b

    • SHA256

      cd6c53a7b02876dd4000b8a7f2bc65ec8bdef5478ec55ef0e727fd9d76799688

    • SHA512

      dc9d4ef4ad582a36e19260b1431c7dcdc8896adce7375054aa79b92ecf378bcf8e493e101b897950e1ea05d78dec303e3f8bb0b697465087f0ef616383fc200c

    • SSDEEP

      1536:aiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:aiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks