General

  • Target

    269d5810ca917e2c32099142d7508cf0_NeikiAnalytics.exe

  • Size

    52KB

  • Sample

    240527-3b3bnsdg6y

  • MD5

    269d5810ca917e2c32099142d7508cf0

  • SHA1

    d81ca49c0deaa9f3ca01edbdf065b0a7e6fd700b

  • SHA256

    ecca5e8ee82efdd4f4aeff70b9e3c34172f31abb275888d34e0eb871ba82dce2

  • SHA512

    7d19b30849c4df603c193cc30051280be2610d2f72cf8efc9b1acd5baa2346056be3c20055954f68278b61ea3acc31fec8fdeb3eae45bc4c270ad66a473fa2a6

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1+33j5n/wkkfw:IzaEW5gMxZVXf8a3yO10pwe

Malware Config

Targets

    • Target

      269d5810ca917e2c32099142d7508cf0_NeikiAnalytics.exe

    • Size

      52KB

    • MD5

      269d5810ca917e2c32099142d7508cf0

    • SHA1

      d81ca49c0deaa9f3ca01edbdf065b0a7e6fd700b

    • SHA256

      ecca5e8ee82efdd4f4aeff70b9e3c34172f31abb275888d34e0eb871ba82dce2

    • SHA512

      7d19b30849c4df603c193cc30051280be2610d2f72cf8efc9b1acd5baa2346056be3c20055954f68278b61ea3acc31fec8fdeb3eae45bc4c270ad66a473fa2a6

    • SSDEEP

      768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1+33j5n/wkkfw:IzaEW5gMxZVXf8a3yO10pwe

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Windows security modification

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks