General

  • Target

    9cd1b67746344d0d7a1a1fa523500110_NeikiAnalytics.exe

  • Size

    724KB

  • Sample

    240518-gkp7taee77

  • MD5

    9cd1b67746344d0d7a1a1fa523500110

  • SHA1

    843448bdc3c5bf7c3881e98abdfa2df18513d4be

  • SHA256

    0fbc0a6d2dcb15d2a679157e7681b53f52bbd6d3fb360704c0991d2a99e570ef

  • SHA512

    7b9c46ec4b77b338a4f8a3828f3593fd815d787658da2e90727b4709181169a6118028320139391f0955be879156112250ccd128fbe7cb35141f1fa2eb60a53a

  • SSDEEP

    12288:lB6jfu9W5qVnpA1P9mTx87m7HGA04OBGaSuQalOZeW0d9NsX+pd167QhEQJ:n67MnVnpA1lmTx8MmA07AaSuDSwdwE6o

Malware Config

Targets

    • Target

      9cd1b67746344d0d7a1a1fa523500110_NeikiAnalytics.exe

    • Size

      724KB

    • MD5

      9cd1b67746344d0d7a1a1fa523500110

    • SHA1

      843448bdc3c5bf7c3881e98abdfa2df18513d4be

    • SHA256

      0fbc0a6d2dcb15d2a679157e7681b53f52bbd6d3fb360704c0991d2a99e570ef

    • SHA512

      7b9c46ec4b77b338a4f8a3828f3593fd815d787658da2e90727b4709181169a6118028320139391f0955be879156112250ccd128fbe7cb35141f1fa2eb60a53a

    • SSDEEP

      12288:lB6jfu9W5qVnpA1P9mTx87m7HGA04OBGaSuQalOZeW0d9NsX+pd167QhEQJ:n67MnVnpA1lmTx8MmA07AaSuDSwdwE6o

    • FakeAV, RogueAntivirus

      FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

    • FakeAV payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks