General

  • Target

    6b6b28f481020ad5c752083168b00cd0_NeikiAnalytics

  • Size

    34KB

  • Sample

    240509-sf41ysfh5x

  • MD5

    6b6b28f481020ad5c752083168b00cd0

  • SHA1

    d5f2431ebb5725bab458d8596a2da342fcaaab3d

  • SHA256

    de2f6ed4d0c20c2c624ae0445abb7346f3b7cc81c3fe7717dbcea14756474a1f

  • SHA512

    793c28ff32202e8c3901e85b4526e6047f2ff11972d9d502ba585a4191f97f87444a9423d84379db76b999d7447457fe43c2f4a12678f1675794c279d0e60925

  • SSDEEP

    768:kp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      6b6b28f481020ad5c752083168b00cd0_NeikiAnalytics

    • Size

      34KB

    • MD5

      6b6b28f481020ad5c752083168b00cd0

    • SHA1

      d5f2431ebb5725bab458d8596a2da342fcaaab3d

    • SHA256

      de2f6ed4d0c20c2c624ae0445abb7346f3b7cc81c3fe7717dbcea14756474a1f

    • SHA512

      793c28ff32202e8c3901e85b4526e6047f2ff11972d9d502ba585a4191f97f87444a9423d84379db76b999d7447457fe43c2f4a12678f1675794c279d0e60925

    • SSDEEP

      768:kp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks