General

  • Target

    03e1819ee0ddef7864336d114308799c5a1290cc76f9cd92e8dcbcd49d735a0e_NeikiAnalytics

  • Size

    1.3MB

  • Sample

    240521-fzn3maag7w

  • MD5

    e430aea4a3bdbeb7c8d8e2f5c6bb39a0

  • SHA1

    d8f538fb31373c22f1d4926bd161bd749ac73733

  • SHA256

    03e1819ee0ddef7864336d114308799c5a1290cc76f9cd92e8dcbcd49d735a0e

  • SHA512

    2b99ee05fbb95909ecab15ac2fcb85c26a4bce28bee961762c8030a6b7c9e9ea65a6344e4c3b7ddf7d7cce048b6e2978f7633e1783e082b170c01b53a55aa3ed

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svKzMhvHa5eJ0K+5f:E5aIwC+Agr6SNvFMs+l

Malware Config

Targets

    • Target

      03e1819ee0ddef7864336d114308799c5a1290cc76f9cd92e8dcbcd49d735a0e_NeikiAnalytics

    • Size

      1.3MB

    • MD5

      e430aea4a3bdbeb7c8d8e2f5c6bb39a0

    • SHA1

      d8f538fb31373c22f1d4926bd161bd749ac73733

    • SHA256

      03e1819ee0ddef7864336d114308799c5a1290cc76f9cd92e8dcbcd49d735a0e

    • SHA512

      2b99ee05fbb95909ecab15ac2fcb85c26a4bce28bee961762c8030a6b7c9e9ea65a6344e4c3b7ddf7d7cce048b6e2978f7633e1783e082b170c01b53a55aa3ed

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svKzMhvHa5eJ0K+5f:E5aIwC+Agr6SNvFMs+l

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Discovery

Query Registry

1
T1012

Impact

Service Stop

1
T1489

Tasks