General

  • Target

    0a334198512183b06eeee1994d5e06b0_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240509-1yp9hscc37

  • MD5

    0a334198512183b06eeee1994d5e06b0

  • SHA1

    03d068afda3232ad055a278e4559436d7b277f25

  • SHA256

    5ac9f80842b118118048639af99d471547a4cf2f515a2430eeac04b2c8984336

  • SHA512

    2dcde422a6689aef65f4adb5e188eb7ac4dc59b6387fa6b2494639408e5829e826d68544cd97ac3aa2a6c7a4c5175554d80f3c76cebe6c8cde6d5ca85774692c

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svY3qbuoVikIXeq1H3K:E5aIwC+Agr6SNv/Ikeeya

Malware Config

Targets

    • Target

      0a334198512183b06eeee1994d5e06b0_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      0a334198512183b06eeee1994d5e06b0

    • SHA1

      03d068afda3232ad055a278e4559436d7b277f25

    • SHA256

      5ac9f80842b118118048639af99d471547a4cf2f515a2430eeac04b2c8984336

    • SHA512

      2dcde422a6689aef65f4adb5e188eb7ac4dc59b6387fa6b2494639408e5829e826d68544cd97ac3aa2a6c7a4c5175554d80f3c76cebe6c8cde6d5ca85774692c

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svY3qbuoVikIXeq1H3K:E5aIwC+Agr6SNv/Ikeeya

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks