General
-
Target
172fff594a9032229131102bded9efe0_NeikiAnalytics.exe
-
Size
1.8MB
-
Sample
240528-3dptcshg56
-
MD5
172fff594a9032229131102bded9efe0
-
SHA1
385be3ee4eec6eb5c8703b0bf5094e6fc96d88cc
-
SHA256
e6f99756b5db0fa13c2737d957876022bf2ad797c5c34d0bf664df8eca6ae7b6
-
SHA512
640e1b62ab67b74318124eee89d62f13d778fbca20e65ae222c48105ff00b816ba19f109c4f7277a435f21ae38bd9a7cbbdd9c2ccd0550bcf808f93baad24f20
-
SSDEEP
12288:Q99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSG9dA7W2FeDSIGVH/KIDgC:k1gg4CppEI6GGfWDkMQDbGV6eH8tkd
Behavioral task
behavioral1
Sample
172fff594a9032229131102bded9efe0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
172fff594a9032229131102bded9efe0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
172fff594a9032229131102bded9efe0_NeikiAnalytics.exe
-
Size
1.8MB
-
MD5
172fff594a9032229131102bded9efe0
-
SHA1
385be3ee4eec6eb5c8703b0bf5094e6fc96d88cc
-
SHA256
e6f99756b5db0fa13c2737d957876022bf2ad797c5c34d0bf664df8eca6ae7b6
-
SHA512
640e1b62ab67b74318124eee89d62f13d778fbca20e65ae222c48105ff00b816ba19f109c4f7277a435f21ae38bd9a7cbbdd9c2ccd0550bcf808f93baad24f20
-
SSDEEP
12288:Q99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSG9dA7W2FeDSIGVH/KIDgC:k1gg4CppEI6GGfWDkMQDbGV6eH8tkd
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1