General
-
Target
9c9cfb46f054ba152005a24e4bc13cd0_NeikiAnalytics
-
Size
1.8MB
-
Sample
240510-h154msda89
-
MD5
9c9cfb46f054ba152005a24e4bc13cd0
-
SHA1
894e8cce959ed8d0fccfefa585891f5fd85c6aeb
-
SHA256
105661772dbcadfa0e07c1d790efb26adce0e54d33ecb6bee0e42ae201eecef1
-
SHA512
3923648a5708f884150318bb5ee9f4df2713bd826b85861bbf2cf1026487ab8b1d5668e361081493ab4cd8b3ede7b7cf9bd173dc7b72eaf95c4082b20aad98a4
-
SSDEEP
24576:P+ss0unD9Gm7yQGbSMZ6/YnFAHZ5r24ZPW5HuehnP2uC/X2nLU:PM5H78bSEnmxZ+Juehnc/2
Behavioral task
behavioral1
Sample
9c9cfb46f054ba152005a24e4bc13cd0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9c9cfb46f054ba152005a24e4bc13cd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
9c9cfb46f054ba152005a24e4bc13cd0_NeikiAnalytics
-
Size
1.8MB
-
MD5
9c9cfb46f054ba152005a24e4bc13cd0
-
SHA1
894e8cce959ed8d0fccfefa585891f5fd85c6aeb
-
SHA256
105661772dbcadfa0e07c1d790efb26adce0e54d33ecb6bee0e42ae201eecef1
-
SHA512
3923648a5708f884150318bb5ee9f4df2713bd826b85861bbf2cf1026487ab8b1d5668e361081493ab4cd8b3ede7b7cf9bd173dc7b72eaf95c4082b20aad98a4
-
SSDEEP
24576:P+ss0unD9Gm7yQGbSMZ6/YnFAHZ5r24ZPW5HuehnP2uC/X2nLU:PM5H78bSEnmxZ+Juehnc/2
Score10/10-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1