General

  • Target

    6a7c1681c4b71dc8f6d751cc249d2ab0_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240509-seysjsfg7y

  • MD5

    6a7c1681c4b71dc8f6d751cc249d2ab0

  • SHA1

    a137509153c5155ae61fa290c48934e2db5f4b90

  • SHA256

    3301053c0b35d623a464716e9b24cf9191007b031cab5095df06c24af944e0c5

  • SHA512

    ecf871bb67ded8648137f3ccef07278025a8943c2b369e8889a30baaaf211f007104836802b599656dcf45db2d02cc3e021d0163a337691be367fdb5f6cb9a95

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChIQM:E5aIwC+Agr6S/FEVy

Malware Config

Targets

    • Target

      6a7c1681c4b71dc8f6d751cc249d2ab0_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      6a7c1681c4b71dc8f6d751cc249d2ab0

    • SHA1

      a137509153c5155ae61fa290c48934e2db5f4b90

    • SHA256

      3301053c0b35d623a464716e9b24cf9191007b031cab5095df06c24af944e0c5

    • SHA512

      ecf871bb67ded8648137f3ccef07278025a8943c2b369e8889a30baaaf211f007104836802b599656dcf45db2d02cc3e021d0163a337691be367fdb5f6cb9a95

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChIQM:E5aIwC+Agr6S/FEVy

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks