General
-
Target
4dd0c6ed7e81fb426d0d7de408104250_NEIKI
-
Size
198KB
-
Sample
240508-zrjygsfb7v
-
MD5
4dd0c6ed7e81fb426d0d7de408104250
-
SHA1
36ff5da3abd0bb17fa19782a900f96a7c108bb37
-
SHA256
520215e153a9df9aa163906d070934e945d6589acd9032d6b70a81cfaabdd453
-
SHA512
a23f39c826f8ff45ccfe093eb59a7494c430281b01255529149cd99e521a6ad9fe354766477fb18fa040d41d35bd67cc959f3ea903de1e8a824454770ca14181
-
SSDEEP
6144:Wur3y6iJv8XQ/g4cDxI5ba2mA9FWra0Ge:ftovP/LwI5ba27MrlGe
Behavioral task
behavioral1
Sample
4dd0c6ed7e81fb426d0d7de408104250_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4dd0c6ed7e81fb426d0d7de408104250_NEIKI.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
4dd0c6ed7e81fb426d0d7de408104250_NEIKI
-
Size
198KB
-
MD5
4dd0c6ed7e81fb426d0d7de408104250
-
SHA1
36ff5da3abd0bb17fa19782a900f96a7c108bb37
-
SHA256
520215e153a9df9aa163906d070934e945d6589acd9032d6b70a81cfaabdd453
-
SHA512
a23f39c826f8ff45ccfe093eb59a7494c430281b01255529149cd99e521a6ad9fe354766477fb18fa040d41d35bd67cc959f3ea903de1e8a824454770ca14181
-
SSDEEP
6144:Wur3y6iJv8XQ/g4cDxI5ba2mA9FWra0Ge:ftovP/LwI5ba27MrlGe
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1