General

  • Target

    9a0be3b65b6c58604d03fdfecd97cf00_NeikiAnalytics

  • Size

    571KB

  • Sample

    240511-hwfm7afc24

  • MD5

    9a0be3b65b6c58604d03fdfecd97cf00

  • SHA1

    a8b1e5410833d0c9cca87d5060c0546d253f0ae0

  • SHA256

    d0e37d5bd658556ebec1d79b930879a425e9eead4fe825daf2ef6834fea9c88d

  • SHA512

    24415e9b16e30fd82ad83cd54b3215c1ab9a84039de93886278af9bf895401152f3810ce849803a7ca79f152197183b7ce519131fa93428db252455ca0b6202b

  • SSDEEP

    12288:EJAFrYLV+/BaGn/ZkMTDMUwJEHy7SxNlfwemWdxTtJAFRYLVZ:lr/BaGnaMEJeyWxNO4mi

Malware Config

Targets

    • Target

      9a0be3b65b6c58604d03fdfecd97cf00_NeikiAnalytics

    • Size

      571KB

    • MD5

      9a0be3b65b6c58604d03fdfecd97cf00

    • SHA1

      a8b1e5410833d0c9cca87d5060c0546d253f0ae0

    • SHA256

      d0e37d5bd658556ebec1d79b930879a425e9eead4fe825daf2ef6834fea9c88d

    • SHA512

      24415e9b16e30fd82ad83cd54b3215c1ab9a84039de93886278af9bf895401152f3810ce849803a7ca79f152197183b7ce519131fa93428db252455ca0b6202b

    • SSDEEP

      12288:EJAFrYLV+/BaGn/ZkMTDMUwJEHy7SxNlfwemWdxTtJAFRYLVZ:lr/BaGnaMEJeyWxNO4mi

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks