General

  • Target

    aeddfe2cdf4005b70fbb406784a08da0_NeikiAnalytics.exe

  • Size

    828KB

  • Sample

    240517-fpxl1sae4w

  • MD5

    aeddfe2cdf4005b70fbb406784a08da0

  • SHA1

    71ed51302abee7173139b1c8faaff3085dbd7b91

  • SHA256

    d3986eda447c4914a39968d9f8c12a02c7828c64247be27178ac4daab52a9688

  • SHA512

    b1a5209512a99d2e97952d15d8970aaa14578268398d93d9af07f53f8037d006eebc5abd1e52f5e7253ba453e4be945c6f2852e1e089e640d8e83b8064090d36

  • SSDEEP

    12288:1/mvVMi0ed7P/RUtfFEqhR1DOG+XOR+TRHLCMAO90zc:1oWeN/RwFEmvDuEqH2Mz90I

Score
10/10

Malware Config

Targets

    • Target

      aeddfe2cdf4005b70fbb406784a08da0_NeikiAnalytics.exe

    • Size

      828KB

    • MD5

      aeddfe2cdf4005b70fbb406784a08da0

    • SHA1

      71ed51302abee7173139b1c8faaff3085dbd7b91

    • SHA256

      d3986eda447c4914a39968d9f8c12a02c7828c64247be27178ac4daab52a9688

    • SHA512

      b1a5209512a99d2e97952d15d8970aaa14578268398d93d9af07f53f8037d006eebc5abd1e52f5e7253ba453e4be945c6f2852e1e089e640d8e83b8064090d36

    • SSDEEP

      12288:1/mvVMi0ed7P/RUtfFEqhR1DOG+XOR+TRHLCMAO90zc:1oWeN/RwFEmvDuEqH2Mz90I

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks