General

  • Target

    3c408c469cd970b4ef22838411850a10_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240509-p9nz2sdf85

  • MD5

    3c408c469cd970b4ef22838411850a10

  • SHA1

    f321e872b18447619531697fe3ca5fd7555c20c4

  • SHA256

    c06fc04bc3057f6f9591f60b48c851de1ce5d6725dd866b686d5d69bc9342803

  • SHA512

    a5404033563ee7776968eb32e3613627531182ace91fe3646ff56b8cdf4c180d29976669018d29717e9c1047791236aef8273c2852b231000017794c9cec708b

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChIg3:E5aIwC+Agr6S/FEV/3

Malware Config

Targets

    • Target

      3c408c469cd970b4ef22838411850a10_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      3c408c469cd970b4ef22838411850a10

    • SHA1

      f321e872b18447619531697fe3ca5fd7555c20c4

    • SHA256

      c06fc04bc3057f6f9591f60b48c851de1ce5d6725dd866b686d5d69bc9342803

    • SHA512

      a5404033563ee7776968eb32e3613627531182ace91fe3646ff56b8cdf4c180d29976669018d29717e9c1047791236aef8273c2852b231000017794c9cec708b

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChIg3:E5aIwC+Agr6S/FEV/3

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks