General

  • Target

    191a74129466d6d03bb9a7feb552cd40_NeikiAnalytics.exe

  • Size

    3.4MB

  • Sample

    240523-he7eksge64

  • MD5

    191a74129466d6d03bb9a7feb552cd40

  • SHA1

    04297292aafeea03b067b1545502f1965d73e379

  • SHA256

    5fcb6d4d6e1bcf1ac788eda74429912dbd94d544fecbd239873d45f3cf95dd28

  • SHA512

    d5741842b5f5f2844e86a28e990fc1912acca3e04100b2c0c88931a7c0a85a5edf47c02cf481937aa37eea599941a642cc938b4bf4654cffc2a4d712de2aaf19

  • SSDEEP

    49152:A5iyZnFmglolcjQ2CLIUFwMrLWkhLjxAN4YfOPCeHuyutAWSEafHO4tsBQPywe/6:A1lBULFLWkhpAN4XPHdWFavbswnx9

Malware Config

Targets

    • Target

      191a74129466d6d03bb9a7feb552cd40_NeikiAnalytics.exe

    • Size

      3.4MB

    • MD5

      191a74129466d6d03bb9a7feb552cd40

    • SHA1

      04297292aafeea03b067b1545502f1965d73e379

    • SHA256

      5fcb6d4d6e1bcf1ac788eda74429912dbd94d544fecbd239873d45f3cf95dd28

    • SHA512

      d5741842b5f5f2844e86a28e990fc1912acca3e04100b2c0c88931a7c0a85a5edf47c02cf481937aa37eea599941a642cc938b4bf4654cffc2a4d712de2aaf19

    • SSDEEP

      49152:A5iyZnFmglolcjQ2CLIUFwMrLWkhLjxAN4YfOPCeHuyutAWSEafHO4tsBQPywe/6:A1lBULFLWkhpAN4XPHdWFavbswnx9

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks