General
-
Target
803a5924f2a740903ad7878426750440_NeikiAnalytics
-
Size
4.8MB
-
Sample
240510-gan7rsdh31
-
MD5
803a5924f2a740903ad7878426750440
-
SHA1
147060843a83ee2a8ee813b4a25c64e894f14e71
-
SHA256
88861277bd4781714d1b18b762a3323c3395da2eb5b0afa5ebf07253020f2482
-
SHA512
055bd00d049c26fdb11d660bb7bed5967d478366025e5f9931c60fea16517811acf5fa22cf73fb4a5826b712a792c7f2fd604d21704b0a1d26786c9203f67dbf
-
SSDEEP
98304:zdItrbTA1mYcXLW6jRhdGVQguhhW31ZK7nh:zwc1j0L5LdGVzu+lah
Static task
static1
Behavioral task
behavioral1
Sample
803a5924f2a740903ad7878426750440_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
803a5924f2a740903ad7878426750440_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw
Targets
-
-
Target
803a5924f2a740903ad7878426750440_NeikiAnalytics
-
Size
4.8MB
-
MD5
803a5924f2a740903ad7878426750440
-
SHA1
147060843a83ee2a8ee813b4a25c64e894f14e71
-
SHA256
88861277bd4781714d1b18b762a3323c3395da2eb5b0afa5ebf07253020f2482
-
SHA512
055bd00d049c26fdb11d660bb7bed5967d478366025e5f9931c60fea16517811acf5fa22cf73fb4a5826b712a792c7f2fd604d21704b0a1d26786c9203f67dbf
-
SSDEEP
98304:zdItrbTA1mYcXLW6jRhdGVQguhhW31ZK7nh:zwc1j0L5LdGVzu+lah
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1