General
-
Target
208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe
-
Size
31KB
-
Sample
240527-f57rxshf3x
-
MD5
208992fff94e0cf721fa83b114d00bf0
-
SHA1
0d8a8f706504b372d8ab97a94794297a63ea086c
-
SHA256
152c1bfa242de3f54aba5421b69c20d50bbd40c4cb536c2f2d67c1c150e1e8dc
-
SHA512
11ea5d2f118bed146343a154027288a2ad6f70f844ba2a03a8674eec1756e820cd9401dc488b5ef8bc2922ca67ac5ff4bd400ac788cad151034573a2f99cfb57
-
SSDEEP
768:EPorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tijwj:Jw68nQbkQVkBj
Behavioral task
behavioral1
Sample
208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
MyBot
192.168.1.7:8964
542af4008a1edcf83bf4d172e7d550ac
-
reg_key
542af4008a1edcf83bf4d172e7d550ac
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
208992fff94e0cf721fa83b114d00bf0_NeikiAnalytics.exe
-
Size
31KB
-
MD5
208992fff94e0cf721fa83b114d00bf0
-
SHA1
0d8a8f706504b372d8ab97a94794297a63ea086c
-
SHA256
152c1bfa242de3f54aba5421b69c20d50bbd40c4cb536c2f2d67c1c150e1e8dc
-
SHA512
11ea5d2f118bed146343a154027288a2ad6f70f844ba2a03a8674eec1756e820cd9401dc488b5ef8bc2922ca67ac5ff4bd400ac788cad151034573a2f99cfb57
-
SSDEEP
768:EPorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tijwj:Jw68nQbkQVkBj
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1