General
-
Target
9053e1e0f0dc79857427f7ef64fa3530_NeikiAnalytics
-
Size
3.2MB
-
Sample
240515-gmgcpacc79
-
MD5
9053e1e0f0dc79857427f7ef64fa3530
-
SHA1
93298ff5140f6ba9724e31dda271148cd73c7511
-
SHA256
5e18fece13e186284ad707df63c1d44b117dbffd5da5b814ebf1a68647679c5b
-
SHA512
9bbcb60546639f4b995a817978c4f3331933fbf7dd409c2b1d06c84aeef1b437cd8e750abdf8dccafb558f5d68fe2f98f42feaeb01ccbee8934147f575cf5657
-
SSDEEP
49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N
Behavioral task
behavioral1
Sample
9053e1e0f0dc79857427f7ef64fa3530_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
9053e1e0f0dc79857427f7ef64fa3530_NeikiAnalytics
-
Size
3.2MB
-
MD5
9053e1e0f0dc79857427f7ef64fa3530
-
SHA1
93298ff5140f6ba9724e31dda271148cd73c7511
-
SHA256
5e18fece13e186284ad707df63c1d44b117dbffd5da5b814ebf1a68647679c5b
-
SHA512
9bbcb60546639f4b995a817978c4f3331933fbf7dd409c2b1d06c84aeef1b437cd8e750abdf8dccafb558f5d68fe2f98f42feaeb01ccbee8934147f575cf5657
-
SSDEEP
49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1