General

  • Target

    f300cc7b25b3cc0767bacd55617efb90_NeikiAnalytics.exe

  • Size

    3.2MB

  • Sample

    240519-tz2klsff5w

  • MD5

    f300cc7b25b3cc0767bacd55617efb90

  • SHA1

    ecf5e85d3089f557f155a1c4e7af2c4e00679262

  • SHA256

    4800634bc6e630962358d178d47050827938391efec2d1658a88c9575a961c3d

  • SHA512

    b468bf870983fc2d2af5cefe218806c4d7a57f088a58f3a7ffe17c2380e201198542150164b2a97329e47b9800b5da0771e1061586cb343d8f552a753158c092

  • SSDEEP

    49152:Bjzc1Bx65LyLql32xfI2+D6gavP76nfpi0nj9q3j84qD0jBmx40dUctPZ5:1wY5Lgqlw/+DeeAkjoj+0jBmx40vP

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.8.115:9999

Targets

    • Target

      f300cc7b25b3cc0767bacd55617efb90_NeikiAnalytics.exe

    • Size

      3.2MB

    • MD5

      f300cc7b25b3cc0767bacd55617efb90

    • SHA1

      ecf5e85d3089f557f155a1c4e7af2c4e00679262

    • SHA256

      4800634bc6e630962358d178d47050827938391efec2d1658a88c9575a961c3d

    • SHA512

      b468bf870983fc2d2af5cefe218806c4d7a57f088a58f3a7ffe17c2380e201198542150164b2a97329e47b9800b5da0771e1061586cb343d8f552a753158c092

    • SSDEEP

      49152:Bjzc1Bx65LyLql32xfI2+D6gavP76nfpi0nj9q3j84qD0jBmx40dUctPZ5:1wY5Lgqlw/+DeeAkjoj+0jBmx40vP

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks