General

  • Target

    18b6f0ac36f2b84bc1a977a37edacac0_NeikiAnalytics.exe

  • Size

    2.5MB

  • Sample

    240523-kel5raag94

  • MD5

    18b6f0ac36f2b84bc1a977a37edacac0

  • SHA1

    adbdb6adc0f2df75a959520ef08c4edc80c1a7e4

  • SHA256

    39ab0f61ec50d62e98388e25ff173d92cc2717b39d1e5ded7b4eba0dcfae37e7

  • SHA512

    e1cafa6985e0878333887106f729c00a83468e3beb8a3a8ae1588e8abc4126cf81def8b0f789c358f0fb929c53881a3349be5f05312ea7f1947db73326cd5d5a

  • SSDEEP

    49152:9XRMCdErFvy/3+eNMoQIQnocsvwaiVIGFZAAYzdlGHG0eyGE/vnCXIu:xRi4muQ5noc0wBVtqAYplGH9Vni

Malware Config

Targets

    • Target

      18b6f0ac36f2b84bc1a977a37edacac0_NeikiAnalytics.exe

    • Size

      2.5MB

    • MD5

      18b6f0ac36f2b84bc1a977a37edacac0

    • SHA1

      adbdb6adc0f2df75a959520ef08c4edc80c1a7e4

    • SHA256

      39ab0f61ec50d62e98388e25ff173d92cc2717b39d1e5ded7b4eba0dcfae37e7

    • SHA512

      e1cafa6985e0878333887106f729c00a83468e3beb8a3a8ae1588e8abc4126cf81def8b0f789c358f0fb929c53881a3349be5f05312ea7f1947db73326cd5d5a

    • SSDEEP

      49152:9XRMCdErFvy/3+eNMoQIQnocsvwaiVIGFZAAYzdlGHG0eyGE/vnCXIu:xRi4muQ5noc0wBVtqAYplGH9Vni

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

4
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks