General
-
Target
74548bc293609543285f3260033299f0_NeikiAnalytics
-
Size
1.2MB
-
Sample
240512-grkwnsfc93
-
MD5
74548bc293609543285f3260033299f0
-
SHA1
70afb45f951e1f4f6a71cdc14206aa7c9dee8982
-
SHA256
ccd8fe156b0f0e49cd57438279edd5309a1cf0bf2d3c0d0276e85a265b125a78
-
SHA512
c76bed7f890884ee3deba85e5f7f7612e8bd9594479f8c7844e2e9c1ec1c69b4daf2db0da35d364ad6b35bd57406ee9ef87d055a6f2b9438461f1b4bd8d505a0
-
SSDEEP
24576:FR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:rJaDKf4p4UD1v
Behavioral task
behavioral1
Sample
74548bc293609543285f3260033299f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74548bc293609543285f3260033299f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
74548bc293609543285f3260033299f0_NeikiAnalytics
-
Size
1.2MB
-
MD5
74548bc293609543285f3260033299f0
-
SHA1
70afb45f951e1f4f6a71cdc14206aa7c9dee8982
-
SHA256
ccd8fe156b0f0e49cd57438279edd5309a1cf0bf2d3c0d0276e85a265b125a78
-
SHA512
c76bed7f890884ee3deba85e5f7f7612e8bd9594479f8c7844e2e9c1ec1c69b4daf2db0da35d364ad6b35bd57406ee9ef87d055a6f2b9438461f1b4bd8d505a0
-
SSDEEP
24576:FR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:rJaDKf4p4UD1v
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1