General
-
Target
0aa0dd946e722343b08540a7a0cf1c40_NeikiAnalytics.exe
-
Size
5.8MB
-
Sample
240527-w2ql8sdb7x
-
MD5
0aa0dd946e722343b08540a7a0cf1c40
-
SHA1
8db0fc9b7e24f6c73aba7c54dea94569e6c5c615
-
SHA256
8ae39d58cf11900e7c6ddfcfce20c37e6e1820bd81b47787f8d47bab83e986ef
-
SHA512
c39f4c257a8faf6a2a0d6bdb05ab6c497750a22db88febbfe3c2e3c44776b7201ea23c0fe2ae2f4d0f7d001130b8d3372cd1adbd56ba1eea69ce793466ad7873
-
SSDEEP
98304:WvwH6P2uW5MI079g+DgeFahftplflf6dUwOEH6d8e6b0+hb5y94kAFq:WvwH6eL2V76+DgTNfwZHYY17Y4hw
Behavioral task
behavioral1
Sample
0aa0dd946e722343b08540a7a0cf1c40_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0aa0dd946e722343b08540a7a0cf1c40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
im523
Xbox Game Studios
kids-notified.at.ply.gg:3845
28025540980d0ce611318033102f9151
-
reg_key
28025540980d0ce611318033102f9151
-
splitter
|'|'|
Targets
-
-
Target
0aa0dd946e722343b08540a7a0cf1c40_NeikiAnalytics.exe
-
Size
5.8MB
-
MD5
0aa0dd946e722343b08540a7a0cf1c40
-
SHA1
8db0fc9b7e24f6c73aba7c54dea94569e6c5c615
-
SHA256
8ae39d58cf11900e7c6ddfcfce20c37e6e1820bd81b47787f8d47bab83e986ef
-
SHA512
c39f4c257a8faf6a2a0d6bdb05ab6c497750a22db88febbfe3c2e3c44776b7201ea23c0fe2ae2f4d0f7d001130b8d3372cd1adbd56ba1eea69ce793466ad7873
-
SSDEEP
98304:WvwH6P2uW5MI079g+DgeFahftplflf6dUwOEH6d8e6b0+hb5y94kAFq:WvwH6eL2V76+DgTNfwZHYY17Y4hw
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1