General
-
Target
3445d710464bbc7a3f37d5775275c28ec609a8bf86aec215601054c81ecf415d_NeikiAnalytics
-
Size
2.2MB
-
Sample
240528-f2r73afg8x
-
MD5
d8fd934802f9c373331197b7fd64975c
-
SHA1
76cf2e77118370aeb9e2ffa0232579b5f5ae53bf
-
SHA256
3445d710464bbc7a3f37d5775275c28ec609a8bf86aec215601054c81ecf415d
-
SHA512
06fc4dc825664cf31ccbf9a290c40ebb59987afac39082748d781d4b72ca249525f5fbe09a25f914613d498b413b5a06f2e6fc86886b84fc4777ebf964349444
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ3:0UzeyQMS4DqodCnoe+iitjWwwT
Behavioral task
behavioral1
Sample
3445d710464bbc7a3f37d5775275c28ec609a8bf86aec215601054c81ecf415d_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
3445d710464bbc7a3f37d5775275c28ec609a8bf86aec215601054c81ecf415d_NeikiAnalytics
-
Size
2.2MB
-
MD5
d8fd934802f9c373331197b7fd64975c
-
SHA1
76cf2e77118370aeb9e2ffa0232579b5f5ae53bf
-
SHA256
3445d710464bbc7a3f37d5775275c28ec609a8bf86aec215601054c81ecf415d
-
SHA512
06fc4dc825664cf31ccbf9a290c40ebb59987afac39082748d781d4b72ca249525f5fbe09a25f914613d498b413b5a06f2e6fc86886b84fc4777ebf964349444
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ3:0UzeyQMS4DqodCnoe+iitjWwwT
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Modifies Installed Components in the registry
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1