General

  • Target

    9cbdc8a1671cdf70d5b0feb2370f1d40_NeikiAnalytics.exe

  • Size

    97KB

  • Sample

    240523-2q8asscb41

  • MD5

    9cbdc8a1671cdf70d5b0feb2370f1d40

  • SHA1

    7798e12b4814cb52a0077ee1e532913951af74f0

  • SHA256

    4160d4d66776f7383750b59ee8409ae5461921a6359378cbf992c21d46e7e802

  • SHA512

    5ade2606be58512e16e55d44e8532112baf1ff2b20c6777e423980269435bfbf45df86450ebe7d8113385f0e723baba001bd27738bdbf686df39e5c2c1c46c85

  • SSDEEP

    1536:4a3+ddygX7y9v7Z+NoykJHBOAFRfBjG3YdoIn:J8dfX7y9DZ+N7eB+tIn

Score
10/10

Malware Config

Targets

    • Target

      9cbdc8a1671cdf70d5b0feb2370f1d40_NeikiAnalytics.exe

    • Size

      97KB

    • MD5

      9cbdc8a1671cdf70d5b0feb2370f1d40

    • SHA1

      7798e12b4814cb52a0077ee1e532913951af74f0

    • SHA256

      4160d4d66776f7383750b59ee8409ae5461921a6359378cbf992c21d46e7e802

    • SHA512

      5ade2606be58512e16e55d44e8532112baf1ff2b20c6777e423980269435bfbf45df86450ebe7d8113385f0e723baba001bd27738bdbf686df39e5c2c1c46c85

    • SSDEEP

      1536:4a3+ddygX7y9v7Z+NoykJHBOAFRfBjG3YdoIn:J8dfX7y9DZ+N7eB+tIn

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks