General

  • Target

    74548bc293609543285f3260033299f0_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240512-grkwnsfc93

  • MD5

    74548bc293609543285f3260033299f0

  • SHA1

    70afb45f951e1f4f6a71cdc14206aa7c9dee8982

  • SHA256

    ccd8fe156b0f0e49cd57438279edd5309a1cf0bf2d3c0d0276e85a265b125a78

  • SHA512

    c76bed7f890884ee3deba85e5f7f7612e8bd9594479f8c7844e2e9c1ec1c69b4daf2db0da35d364ad6b35bd57406ee9ef87d055a6f2b9438461f1b4bd8d505a0

  • SSDEEP

    24576:FR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:rJaDKf4p4UD1v

Malware Config

Targets

    • Target

      74548bc293609543285f3260033299f0_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      74548bc293609543285f3260033299f0

    • SHA1

      70afb45f951e1f4f6a71cdc14206aa7c9dee8982

    • SHA256

      ccd8fe156b0f0e49cd57438279edd5309a1cf0bf2d3c0d0276e85a265b125a78

    • SHA512

      c76bed7f890884ee3deba85e5f7f7612e8bd9594479f8c7844e2e9c1ec1c69b4daf2db0da35d364ad6b35bd57406ee9ef87d055a6f2b9438461f1b4bd8d505a0

    • SSDEEP

      24576:FR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:rJaDKf4p4UD1v

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks