General

  • Target

    3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics

  • Size

    351KB

  • Sample

    240511-ar5shsaf5v

  • MD5

    3c554ec6311d8b0f4a4119150ffaa170

  • SHA1

    364d1636f7dad5fcdf7a11a253412982036d3a6d

  • SHA256

    bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

  • SHA512

    1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

  • SSDEEP

    6144:V/OZpliYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Miqx/M7/Mx/MQ/MU

Score
10/10

Malware Config

Targets

    • Target

      3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics

    • Size

      351KB

    • MD5

      3c554ec6311d8b0f4a4119150ffaa170

    • SHA1

      364d1636f7dad5fcdf7a11a253412982036d3a6d

    • SHA256

      bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

    • SHA512

      1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

    • SSDEEP

      6144:V/OZpliYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Miqx/M7/Mx/MQ/MU

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks