General
-
Target
7d51904b084c1d1037f17ed8aaa57a70_NeikiAnalytics.exe
-
Size
3.2MB
-
Sample
240520-bp2thsda58
-
MD5
7d51904b084c1d1037f17ed8aaa57a70
-
SHA1
d2d0d38ca329c1cb2fa955c8fbb3f12cb28fc05d
-
SHA256
8d23e71c63a93438c953695aa9cc56ca5a8a2b05ad94ba7535698add6dad98e6
-
SHA512
cb0065905907951367375dde96c9c6e4b27ffa041c4ab870e03744d94ef091010396e77fa6ff26e2b1677e36c7254ee953d23ffa707e1ffe79f939cfd91d8582
-
SSDEEP
49152:nC0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:nC0Fl8v/qXYrv5tG9uKJGAWl5N
Behavioral task
behavioral1
Sample
7d51904b084c1d1037f17ed8aaa57a70_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
7d51904b084c1d1037f17ed8aaa57a70_NeikiAnalytics.exe
-
Size
3.2MB
-
MD5
7d51904b084c1d1037f17ed8aaa57a70
-
SHA1
d2d0d38ca329c1cb2fa955c8fbb3f12cb28fc05d
-
SHA256
8d23e71c63a93438c953695aa9cc56ca5a8a2b05ad94ba7535698add6dad98e6
-
SHA512
cb0065905907951367375dde96c9c6e4b27ffa041c4ab870e03744d94ef091010396e77fa6ff26e2b1677e36c7254ee953d23ffa707e1ffe79f939cfd91d8582
-
SSDEEP
49152:nC0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:nC0Fl8v/qXYrv5tG9uKJGAWl5N
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1