General

  • Target

    fcacb16567d65cda66d34ae96954eeb0_NeikiAnalytics.exe

  • Size

    231KB

  • Sample

    240525-q52k1sef8w

  • MD5

    fcacb16567d65cda66d34ae96954eeb0

  • SHA1

    c0dc26ea34fd2594f2690fc130c9a346b7257c06

  • SHA256

    3a2eb9dfbef8eb388c5dad9ab78fef11dff0f0d627afb092d1b404c573dbdbb9

  • SHA512

    a57ea9f7e5e22e9aad76436bbc91f5f1c1dc36aa94f8e4c84a536134daee39220e729e99095a462ce02d176f3b490c9701812c1c2bd1ca4c512f6d53c44d95f0

  • SSDEEP

    6144:otzuglqghAbtpABzd+BMwJXqNvQ1kCBaCCJx9b25c:otzuglqghAbtpABzdq0gBfO

Malware Config

Targets

    • Target

      fcacb16567d65cda66d34ae96954eeb0_NeikiAnalytics.exe

    • Size

      231KB

    • MD5

      fcacb16567d65cda66d34ae96954eeb0

    • SHA1

      c0dc26ea34fd2594f2690fc130c9a346b7257c06

    • SHA256

      3a2eb9dfbef8eb388c5dad9ab78fef11dff0f0d627afb092d1b404c573dbdbb9

    • SHA512

      a57ea9f7e5e22e9aad76436bbc91f5f1c1dc36aa94f8e4c84a536134daee39220e729e99095a462ce02d176f3b490c9701812c1c2bd1ca4c512f6d53c44d95f0

    • SSDEEP

      6144:otzuglqghAbtpABzd+BMwJXqNvQ1kCBaCCJx9b25c:otzuglqghAbtpABzdq0gBfO

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks