General

  • Target

    4dd0c6ed7e81fb426d0d7de408104250_NEIKI

  • Size

    198KB

  • Sample

    240508-zrjygsfb7v

  • MD5

    4dd0c6ed7e81fb426d0d7de408104250

  • SHA1

    36ff5da3abd0bb17fa19782a900f96a7c108bb37

  • SHA256

    520215e153a9df9aa163906d070934e945d6589acd9032d6b70a81cfaabdd453

  • SHA512

    a23f39c826f8ff45ccfe093eb59a7494c430281b01255529149cd99e521a6ad9fe354766477fb18fa040d41d35bd67cc959f3ea903de1e8a824454770ca14181

  • SSDEEP

    6144:Wur3y6iJv8XQ/g4cDxI5ba2mA9FWra0Ge:ftovP/LwI5ba27MrlGe

Score
7/10

Malware Config

Targets

    • Target

      4dd0c6ed7e81fb426d0d7de408104250_NEIKI

    • Size

      198KB

    • MD5

      4dd0c6ed7e81fb426d0d7de408104250

    • SHA1

      36ff5da3abd0bb17fa19782a900f96a7c108bb37

    • SHA256

      520215e153a9df9aa163906d070934e945d6589acd9032d6b70a81cfaabdd453

    • SHA512

      a23f39c826f8ff45ccfe093eb59a7494c430281b01255529149cd99e521a6ad9fe354766477fb18fa040d41d35bd67cc959f3ea903de1e8a824454770ca14181

    • SSDEEP

      6144:Wur3y6iJv8XQ/g4cDxI5ba2mA9FWra0Ge:ftovP/LwI5ba27MrlGe

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks