General

  • Target

    ce9417db64112d36f1d37ae65e499be0_NeikiAnalytics

  • Size

    35KB

  • Sample

    240514-vlwmwafg36

  • MD5

    ce9417db64112d36f1d37ae65e499be0

  • SHA1

    05f2e7b62266060d9dbc8c3cb324faedb4b9c6de

  • SHA256

    6701a519dca5bfe80c0db302f50c0edb67bdb48f3feb2569e19eae2c1c9d6cbf

  • SHA512

    0e2b9f308973eaacaf5e1e5bb53bea461e39fd993df802cb736af0680057ee8a276de8f31a06d8e017a5e0c0f922dd2fefd0aa09cddc1825e29ead98938c0120

  • SSDEEP

    768:gTQ2WueGXbvqpBG2VVaa+FaaY0WOy5v7M73G/LyEllVTB:kQ2cwbKQYVx+8apYv7uoLhlVTB

Malware Config

Targets

    • Target

      ce9417db64112d36f1d37ae65e499be0_NeikiAnalytics

    • Size

      35KB

    • MD5

      ce9417db64112d36f1d37ae65e499be0

    • SHA1

      05f2e7b62266060d9dbc8c3cb324faedb4b9c6de

    • SHA256

      6701a519dca5bfe80c0db302f50c0edb67bdb48f3feb2569e19eae2c1c9d6cbf

    • SHA512

      0e2b9f308973eaacaf5e1e5bb53bea461e39fd993df802cb736af0680057ee8a276de8f31a06d8e017a5e0c0f922dd2fefd0aa09cddc1825e29ead98938c0120

    • SSDEEP

      768:gTQ2WueGXbvqpBG2VVaa+FaaY0WOy5v7M73G/LyEllVTB:kQ2cwbKQYVx+8apYv7uoLhlVTB

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks