General

  • Target

    0465acb9f7efc651e01f7eeec1b6c250_NEIKI

  • Size

    128KB

  • Sample

    240509-k35a8sab2z

  • MD5

    0465acb9f7efc651e01f7eeec1b6c250

  • SHA1

    d7443474833302450a22e52add231550c5d48593

  • SHA256

    6e3337efe5804233cce7a1d853e108e47fe792ed0c224fa7c780cf658bc817cd

  • SHA512

    1345c10e83e218ca5b978d86e4d13b792105ace21c651dac72bff90dd2c90c53bbfd722fec003d2a1f6106dd30508124ce3129df4fb4d4eac67a387c99dec637

  • SSDEEP

    3072:Q4g+pXOj//ZR03aaVzze9lj9pui6yYPaI7DehizrVtN:jXOr/ZRIo1pui6yYPaIGc

Score
10/10

Malware Config

Targets

    • Target

      0465acb9f7efc651e01f7eeec1b6c250_NEIKI

    • Size

      128KB

    • MD5

      0465acb9f7efc651e01f7eeec1b6c250

    • SHA1

      d7443474833302450a22e52add231550c5d48593

    • SHA256

      6e3337efe5804233cce7a1d853e108e47fe792ed0c224fa7c780cf658bc817cd

    • SHA512

      1345c10e83e218ca5b978d86e4d13b792105ace21c651dac72bff90dd2c90c53bbfd722fec003d2a1f6106dd30508124ce3129df4fb4d4eac67a387c99dec637

    • SSDEEP

      3072:Q4g+pXOj//ZR03aaVzze9lj9pui6yYPaI7DehizrVtN:jXOr/ZRIo1pui6yYPaIGc

    Score
    10/10
    • Adds autorun key to be loaded by Explorer.exe on startup

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks