General
-
Target
6673bb93a54c3f7b3b9920ce8ae790b0_NeikiAnalytics
-
Size
4.1MB
-
Sample
240514-dtyzjahc77
-
MD5
6673bb93a54c3f7b3b9920ce8ae790b0
-
SHA1
b568a2d0801fbe95fdb224fb0035307bf227b08c
-
SHA256
56f49b556978239faf310841c836e0d38c203a05d590ef342d504885b27e803e
-
SHA512
8f958ef8372b44f2a96e8a6c9e316bd0efc92d137cc2a85c2bc95a36081207ad8b21dd95f42b49b02961c830c65fd94e3667dac67aa0370a57d61e95171f93b7
-
SSDEEP
98304:wZBYodPjV28lb5JpfvrGhMDLp6JPlQhuHVBwbejK4R+unqd/:GWubV2Y3pfDGQ6wCDQuno
Static task
static1
Behavioral task
behavioral1
Sample
6673bb93a54c3f7b3b9920ce8ae790b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
6673bb93a54c3f7b3b9920ce8ae790b0_NeikiAnalytics
-
Size
4.1MB
-
MD5
6673bb93a54c3f7b3b9920ce8ae790b0
-
SHA1
b568a2d0801fbe95fdb224fb0035307bf227b08c
-
SHA256
56f49b556978239faf310841c836e0d38c203a05d590ef342d504885b27e803e
-
SHA512
8f958ef8372b44f2a96e8a6c9e316bd0efc92d137cc2a85c2bc95a36081207ad8b21dd95f42b49b02961c830c65fd94e3667dac67aa0370a57d61e95171f93b7
-
SSDEEP
98304:wZBYodPjV28lb5JpfvrGhMDLp6JPlQhuHVBwbejK4R+unqd/:GWubV2Y3pfDGQ6wCDQuno
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1