General

  • Target

    20fd479612347384639aa45f00e4c560476b686250697448da1c03b0896d2ed6_NeikiAnalytics

  • Size

    2.4MB

  • Sample

    240521-j9qwraed39

  • MD5

    60ffcef519a85d941e2ecaac3a416a90

  • SHA1

    262bc2da61bb126e6dbdb9887d9d9ed89260f0fa

  • SHA256

    20fd479612347384639aa45f00e4c560476b686250697448da1c03b0896d2ed6

  • SHA512

    07ce159d7e9fee05384a377e7b56deba1a83d8897de342148dc4fd3d354fdc8557af674c53c4e640edf1ca101f04de92dfe02f137440bb64fc7e92e3f272b959

  • SSDEEP

    49152:sgGk8icRPZBkNyjs1bl6DznsUwdgJGFi5G9Ex/oh0O:m3rjgRQznNKg8AU9W/aT

Malware Config

Targets

    • Target

      20fd479612347384639aa45f00e4c560476b686250697448da1c03b0896d2ed6_NeikiAnalytics

    • Size

      2.4MB

    • MD5

      60ffcef519a85d941e2ecaac3a416a90

    • SHA1

      262bc2da61bb126e6dbdb9887d9d9ed89260f0fa

    • SHA256

      20fd479612347384639aa45f00e4c560476b686250697448da1c03b0896d2ed6

    • SHA512

      07ce159d7e9fee05384a377e7b56deba1a83d8897de342148dc4fd3d354fdc8557af674c53c4e640edf1ca101f04de92dfe02f137440bb64fc7e92e3f272b959

    • SSDEEP

      49152:sgGk8icRPZBkNyjs1bl6DznsUwdgJGFi5G9Ex/oh0O:m3rjgRQznNKg8AU9W/aT

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies AppInit DLL entries

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks