General

  • Target

    f338cffc5521802e88db04bca8b15530_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240519-t1gxlaff6y

  • MD5

    f338cffc5521802e88db04bca8b15530

  • SHA1

    0a93ca88790435c6ad8aa62225ce034a3ff4b2ff

  • SHA256

    5da4a387c7225fbd8fe532b1798bd5deb06bc2074610e28225016bc746ecb6ca

  • SHA512

    fca8d151c41ac8150b93d6fe6a11854b14f8e554e1a6a151ac5e8608ff90813d6603ba970f0ae7d53a44d8be78810455587d4384ae3ffb009a3838bbbee39067

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSM632:E5aIwC+Agr6SNG2

Malware Config

Targets

    • Target

      f338cffc5521802e88db04bca8b15530_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      f338cffc5521802e88db04bca8b15530

    • SHA1

      0a93ca88790435c6ad8aa62225ce034a3ff4b2ff

    • SHA256

      5da4a387c7225fbd8fe532b1798bd5deb06bc2074610e28225016bc746ecb6ca

    • SHA512

      fca8d151c41ac8150b93d6fe6a11854b14f8e554e1a6a151ac5e8608ff90813d6603ba970f0ae7d53a44d8be78810455587d4384ae3ffb009a3838bbbee39067

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSM632:E5aIwC+Agr6SNG2

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks