General

  • Target

    60d568e6a8a1a84480b7514ad28ab340_NeikiAnalytics

  • Size

    411KB

  • Sample

    240510-d89pksgh2z

  • MD5

    60d568e6a8a1a84480b7514ad28ab340

  • SHA1

    f218c0ddaeae60caca073c0f3c1e2d755bcd65e8

  • SHA256

    3efa03a07bd3015f3dbc4a27ce6c8a318ecd245fb4fc5f13148fd7fdff407d47

  • SHA512

    ea7b67cf37e00c9fb5a8098e4d0b8b25ee98a8885eb5ee45d3519150a32e4f9f05557169856c5b37b50cd03e475768b42b9aaccf800aced90fb4578d3bd7f21e

  • SSDEEP

    6144:DP8MgrmEs7eVyYr9AmEcmI5qpYDb1MV+w1ILKcZFXF:DP8Mg9sKVyY3EcmIopMbv1OcZr

Score
8/10
upx

Malware Config

Targets

    • Target

      60d568e6a8a1a84480b7514ad28ab340_NeikiAnalytics

    • Size

      411KB

    • MD5

      60d568e6a8a1a84480b7514ad28ab340

    • SHA1

      f218c0ddaeae60caca073c0f3c1e2d755bcd65e8

    • SHA256

      3efa03a07bd3015f3dbc4a27ce6c8a318ecd245fb4fc5f13148fd7fdff407d47

    • SHA512

      ea7b67cf37e00c9fb5a8098e4d0b8b25ee98a8885eb5ee45d3519150a32e4f9f05557169856c5b37b50cd03e475768b42b9aaccf800aced90fb4578d3bd7f21e

    • SSDEEP

      6144:DP8MgrmEs7eVyYr9AmEcmI5qpYDb1MV+w1ILKcZFXF:DP8Mg9sKVyY3EcmIopMbv1OcZr

    Score
    8/10
    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks