General
-
Target
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics
-
Size
132KB
-
Sample
240516-ryctrahc8y
-
MD5
e23f4ad614f78dcb3f764230cf7dcac0
-
SHA1
b3cc813950096b67918d2390bdc44cd2fd7690c0
-
SHA256
5f60494ac4b93c4fae27a7d1d02dea2bfaa8ace8e4dcf89b08bc4ac5030348d1
-
SHA512
a7c56df4a85b17fb69bd42c953beb751c187a510526c1be31ffb1c71359c6925555fc21a831b0af793cb428f42204104db754a57baf826895a831074ffbfe76b
-
SSDEEP
3072:uaBrGi1vPTm3cf2q7QM0tYwk/cUJNVYRQ2OzSJGbBx3DeUaoc/Q7e2K:VHK6h7QMRhLF2eSIbBx3W47HK
Static task
static1
Behavioral task
behavioral1
Sample
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics
-
Size
132KB
-
MD5
e23f4ad614f78dcb3f764230cf7dcac0
-
SHA1
b3cc813950096b67918d2390bdc44cd2fd7690c0
-
SHA256
5f60494ac4b93c4fae27a7d1d02dea2bfaa8ace8e4dcf89b08bc4ac5030348d1
-
SHA512
a7c56df4a85b17fb69bd42c953beb751c187a510526c1be31ffb1c71359c6925555fc21a831b0af793cb428f42204104db754a57baf826895a831074ffbfe76b
-
SSDEEP
3072:uaBrGi1vPTm3cf2q7QM0tYwk/cUJNVYRQ2OzSJGbBx3DeUaoc/Q7e2K:VHK6h7QMRhLF2eSIbBx3W47HK
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1