General
-
Target
4ac1cd9b053f1ed43f0cef935d805870_NeikiAnalytics
-
Size
4.1MB
-
Sample
240515-2qj8zaga2y
-
MD5
4ac1cd9b053f1ed43f0cef935d805870
-
SHA1
c6aa6df20d1376c06e06de2b00b005d5a3050471
-
SHA256
c84ee9d6641dd8f467f7f6f6d138928dc0cfdf2c2fcc66f9e4fc8f8768df9603
-
SHA512
d2852bbcf9dcdb040a5e33f02b75e9b2afffa6b5423304d34f2de596f249fbbcbe2c1ae31b8b04180659e7d21bc5491dc3c905aff13312c1e4b30d07b551be2c
-
SSDEEP
98304:gjBgyvXIU5i0ZT37WYIgo6CvO2n1yECcNHBKQxG9:yB+ki0ZT37WYo6qf1ySNh3I
Static task
static1
Behavioral task
behavioral1
Sample
4ac1cd9b053f1ed43f0cef935d805870_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
4ac1cd9b053f1ed43f0cef935d805870_NeikiAnalytics
-
Size
4.1MB
-
MD5
4ac1cd9b053f1ed43f0cef935d805870
-
SHA1
c6aa6df20d1376c06e06de2b00b005d5a3050471
-
SHA256
c84ee9d6641dd8f467f7f6f6d138928dc0cfdf2c2fcc66f9e4fc8f8768df9603
-
SHA512
d2852bbcf9dcdb040a5e33f02b75e9b2afffa6b5423304d34f2de596f249fbbcbe2c1ae31b8b04180659e7d21bc5491dc3c905aff13312c1e4b30d07b551be2c
-
SSDEEP
98304:gjBgyvXIU5i0ZT37WYIgo6CvO2n1yECcNHBKQxG9:yB+ki0ZT37WYo6qf1ySNh3I
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1