General

  • Target

    5a0c12ac053e66852ca6d111a216a940_NeikiAnalytics

  • Size

    124KB

  • Sample

    240510-dtg11sba69

  • MD5

    5a0c12ac053e66852ca6d111a216a940

  • SHA1

    c140c6544fb44f31becc620b8c2f2f8b0fd31bdf

  • SHA256

    d21f40564744db456e95e788a9768798577feae1dbdb70ebb9842b43feff6daa

  • SHA512

    ec45a233f79772dc2887236c733e54e8af2c8cde7510b2a7601949d6ad4bd9489afed6bc497905bdc773308a2d2006e4724d41688a6af558ac666b73dd894da7

  • SSDEEP

    1536:vjmMW0owZMnS1wjkHWrHUdPSGAq1O5LWnouy8m:vFW0VqSmI2jUKmOtmout

Malware Config

Targets

    • Target

      5a0c12ac053e66852ca6d111a216a940_NeikiAnalytics

    • Size

      124KB

    • MD5

      5a0c12ac053e66852ca6d111a216a940

    • SHA1

      c140c6544fb44f31becc620b8c2f2f8b0fd31bdf

    • SHA256

      d21f40564744db456e95e788a9768798577feae1dbdb70ebb9842b43feff6daa

    • SHA512

      ec45a233f79772dc2887236c733e54e8af2c8cde7510b2a7601949d6ad4bd9489afed6bc497905bdc773308a2d2006e4724d41688a6af558ac666b73dd894da7

    • SSDEEP

      1536:vjmMW0owZMnS1wjkHWrHUdPSGAq1O5LWnouy8m:vFW0VqSmI2jUKmOtmout

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks