General
-
Target
37661e453fc7647eddf5f9e9b3778aa0_NeikiAnalytics.exe
-
Size
4.1MB
-
Sample
240518-x3zrzabd2w
-
MD5
37661e453fc7647eddf5f9e9b3778aa0
-
SHA1
ed7b3cc6d552c45befdbfc0fcf158ee591645d57
-
SHA256
3a4298139a4b2c70379737b8abfdae93c44a3650d205c0773c3e6e69c78ef5b7
-
SHA512
fcd7ffd51ebcfaa445ac08aa8201a7103df03036e0ec8b24a5dbf806232ac3a44cb107b3db1d3916746790eb6969d4179afb0ce618649c3ca651ab4f477e6f8d
-
SSDEEP
98304:dBH5QtHgtXZGwxAeX68LG3wNCsYjHyiS0gsLIyJOWEFSdaDQG3a9ntG:dBZQtHgtXlxHq4G3ixkyiJTOnSQDy9ng
Static task
static1
Behavioral task
behavioral1
Sample
37661e453fc7647eddf5f9e9b3778aa0_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
37661e453fc7647eddf5f9e9b3778aa0_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
37661e453fc7647eddf5f9e9b3778aa0
-
SHA1
ed7b3cc6d552c45befdbfc0fcf158ee591645d57
-
SHA256
3a4298139a4b2c70379737b8abfdae93c44a3650d205c0773c3e6e69c78ef5b7
-
SHA512
fcd7ffd51ebcfaa445ac08aa8201a7103df03036e0ec8b24a5dbf806232ac3a44cb107b3db1d3916746790eb6969d4179afb0ce618649c3ca651ab4f477e6f8d
-
SSDEEP
98304:dBH5QtHgtXZGwxAeX68LG3wNCsYjHyiS0gsLIyJOWEFSdaDQG3a9ntG:dBZQtHgtXlxHq4G3ixkyiJTOnSQDy9ng
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1