General

  • Target

    fakeav.zip

  • Size

    416KB

  • Sample

    240520-sq6mjaga3y

  • MD5

    5e79ceee733072a017c885afbb1d9d54

  • SHA1

    8617bf9647b7aa4b2a8376c134d83a4fdb171723

  • SHA256

    c8a127a82ba68505eea2ec806f7fa0b564fb791078ffad7cbaaf038df1e7056b

  • SHA512

    c6db88743d8ebb9861ab56f9489f6a1375a83291856509baafdc1f930b904e4ab152470535cad7f949b3ee4f7c2c4c6c13f0ac08bb4888160ecba6f60248c257

  • SSDEEP

    12288:njcAKGgPjiP8gzuMxYvAyNv4jxSdLcAHXNbJxBst:jcfGgbikgaLNgjgNL99xBst

Malware Config

Targets

    • Target

      90307e8421fc5314379ba87f56a11034_NeikiAnalytics.exe

    • Size

      724KB

    • MD5

      90307e8421fc5314379ba87f56a11034

    • SHA1

      8759bb96cf5e8d80a12680713247d309cdbb4912

    • SHA256

      f5508c69fbce303346346f9e969eb9438ebf08f0fab8a0a497e5467b88c5a567

    • SHA512

      629c0f02bf197ad9234d9b1732075ca41b2b6612e9dfc80d44f29b2e221a3097e53ea63d06074481a8804d9cb72238ea68e2dc5c101d595c09e0694a92c3c389

    • SSDEEP

      12288:lB6jfu9W5qVnpA1P9mTx87m7HGA04OBGaSuQalOZeW0dONMX+pd167QhEQJ:n67MnVnpA1lmTx8MmA07AaSuDSwdnE6o

    • FakeAV, RogueAntivirus

      FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

    • FakeAV payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks