General

  • Target

    52b749ae7f9df7445fba964770964150_NeikiAnalytics

  • Size

    3.6MB

  • Sample

    240510-da5mzahh58

  • MD5

    52b749ae7f9df7445fba964770964150

  • SHA1

    bfa81367c72e0d37c640f3dc809002c3425d0cb5

  • SHA256

    2069e1c6bfa6fb43508120eb064d74b2ab0e79fd55984945829f509a1d3c5757

  • SHA512

    f22510e13b5809bd6f9c3d9828681c242ead3a1381a418654728073ca8783db1f277f18da2250c4ba552dbda207fe96a3fb6b94c7363b9db201bc949f606a04c

  • SSDEEP

    49152:Vu/dUpCw4SIjcP0idTfTXE5JJ7g97/mHEY/D+Vam0IAo:Vg4midTSJMRY/Nv1o

Malware Config

Targets

    • Target

      52b749ae7f9df7445fba964770964150_NeikiAnalytics

    • Size

      3.6MB

    • MD5

      52b749ae7f9df7445fba964770964150

    • SHA1

      bfa81367c72e0d37c640f3dc809002c3425d0cb5

    • SHA256

      2069e1c6bfa6fb43508120eb064d74b2ab0e79fd55984945829f509a1d3c5757

    • SHA512

      f22510e13b5809bd6f9c3d9828681c242ead3a1381a418654728073ca8783db1f277f18da2250c4ba552dbda207fe96a3fb6b94c7363b9db201bc949f606a04c

    • SSDEEP

      49152:Vu/dUpCw4SIjcP0idTfTXE5JJ7g97/mHEY/D+Vam0IAo:Vg4midTSJMRY/Nv1o

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks