General

  • Target

    d7405ea1d9d6863885eb7816f9aa0ef0_NeikiAnalytics.exe

  • Size

    3.5MB

  • Sample

    240517-jyhq1aha47

  • MD5

    d7405ea1d9d6863885eb7816f9aa0ef0

  • SHA1

    40f2c4052174017f2453098998597cd220240a7f

  • SHA256

    8a13fc6fb5e4aec1158a29d64b03de3ac20ab1ec51153174183a4a823b1fa004

  • SHA512

    8bbac3f3eab637b1e23a369a724e100f9340f81c6c3d92cace12f56ce4434335857b0bc7ef5f80aa5cf076939cae0345d9d25e0bac29ffeb65a55fecdcb44450

  • SSDEEP

    49152:67N1ahCt0V7N1ahCO0V7N1ahCG0V7N1ahCD0V7N1ahCf0:67g777T727

Malware Config

Targets

    • Target

      d7405ea1d9d6863885eb7816f9aa0ef0_NeikiAnalytics.exe

    • Size

      3.5MB

    • MD5

      d7405ea1d9d6863885eb7816f9aa0ef0

    • SHA1

      40f2c4052174017f2453098998597cd220240a7f

    • SHA256

      8a13fc6fb5e4aec1158a29d64b03de3ac20ab1ec51153174183a4a823b1fa004

    • SHA512

      8bbac3f3eab637b1e23a369a724e100f9340f81c6c3d92cace12f56ce4434335857b0bc7ef5f80aa5cf076939cae0345d9d25e0bac29ffeb65a55fecdcb44450

    • SSDEEP

      49152:67N1ahCt0V7N1ahCO0V7N1ahCG0V7N1ahCD0V7N1ahCf0:67g777T727

    • FakeAV, RogueAntivirus

      FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

    • FakeAV payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks