General

  • Target

    43ca84c6ce357df9bf4d7d0faafb1030_NeikiAnalytics

  • Size

    437KB

  • Sample

    240511-bbscxsca4v

  • MD5

    43ca84c6ce357df9bf4d7d0faafb1030

  • SHA1

    7e10745402c4a037ec8aa3a83e4273531347f3b7

  • SHA256

    d0ba083540dacb845d43f74b494c0ee4f5b0df7424b2bdb0b7cfdd1308480adc

  • SHA512

    317787210309bd219c81e268bb39b29ada8a1bbdef263d5d9d76fc4591acba27d9bf23197e06dc85928a51329f9b87cc42875cfb7cb67491fc4217f4aae18d5a

  • SSDEEP

    6144:/MHD3/AK2Es7eVyYr9AmEcmI5qpYDb1MV+w1ILKcrsliCC+B:/MHL/ACsKVyY3EcmIopMbv1Ocr9aB

Score
8/10

Malware Config

Targets

    • Target

      43ca84c6ce357df9bf4d7d0faafb1030_NeikiAnalytics

    • Size

      437KB

    • MD5

      43ca84c6ce357df9bf4d7d0faafb1030

    • SHA1

      7e10745402c4a037ec8aa3a83e4273531347f3b7

    • SHA256

      d0ba083540dacb845d43f74b494c0ee4f5b0df7424b2bdb0b7cfdd1308480adc

    • SHA512

      317787210309bd219c81e268bb39b29ada8a1bbdef263d5d9d76fc4591acba27d9bf23197e06dc85928a51329f9b87cc42875cfb7cb67491fc4217f4aae18d5a

    • SSDEEP

      6144:/MHD3/AK2Es7eVyYr9AmEcmI5qpYDb1MV+w1ILKcrsliCC+B:/MHL/ACsKVyY3EcmIopMbv1Ocr9aB

    Score
    8/10
    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks