General

  • Target

    36af72cda293175aa137625397ea3670_NeikiAnalytics.exe

  • Size

    1.0MB

  • Sample

    240528-g9esdahd3t

  • MD5

    36af72cda293175aa137625397ea3670

  • SHA1

    6556d9542e6ede3695bff545f36963ae77f0f49f

  • SHA256

    8d383a6e3eb8bff5ddf13feec73575e2fa871ac35104cb0316abdf285b47db6b

  • SHA512

    da45412e2fd3e4c80ec700d877e58656cd6a04d7dbb9247752ca7a9b55ff8163107d4a60f7cf01ccf56484bac744d9893a9ee9c1d6a9085f96ab11798f2301fe

  • SSDEEP

    12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVf4R6u:zQ5aILMCfmAUjzX6T0TlOnvPyQCf4Rdf

Malware Config

Targets

    • Target

      36af72cda293175aa137625397ea3670_NeikiAnalytics.exe

    • Size

      1.0MB

    • MD5

      36af72cda293175aa137625397ea3670

    • SHA1

      6556d9542e6ede3695bff545f36963ae77f0f49f

    • SHA256

      8d383a6e3eb8bff5ddf13feec73575e2fa871ac35104cb0316abdf285b47db6b

    • SHA512

      da45412e2fd3e4c80ec700d877e58656cd6a04d7dbb9247752ca7a9b55ff8163107d4a60f7cf01ccf56484bac744d9893a9ee9c1d6a9085f96ab11798f2301fe

    • SSDEEP

      12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVf4R6u:zQ5aILMCfmAUjzX6T0TlOnvPyQCf4Rdf

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks