General

  • Target

    4e6ddc219501c111dd2d6ec71095a470_NeikiAnalytics.exe

  • Size

    1.2MB

  • Sample

    240529-k3dtaaac89

  • MD5

    4e6ddc219501c111dd2d6ec71095a470

  • SHA1

    54e027816d310161ee2eac4dbad12de2409ca1cc

  • SHA256

    2e87dd918b9862a7a9ac0971383c92965de41e42376ad046b0bfb982a5917b8d

  • SHA512

    fac9100130861946b12c9fe829ce31da39ef29159faf87d5b85d4e276eb75e1c6977e2994a895466f57ac42063ce8dd57bf496bcdb1d7a9431317ee865b47076

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFq+dty:E5aIwC+Agr6SqCPGvTod

Malware Config

Targets

    • Target

      4e6ddc219501c111dd2d6ec71095a470_NeikiAnalytics.exe

    • Size

      1.2MB

    • MD5

      4e6ddc219501c111dd2d6ec71095a470

    • SHA1

      54e027816d310161ee2eac4dbad12de2409ca1cc

    • SHA256

      2e87dd918b9862a7a9ac0971383c92965de41e42376ad046b0bfb982a5917b8d

    • SHA512

      fac9100130861946b12c9fe829ce31da39ef29159faf87d5b85d4e276eb75e1c6977e2994a895466f57ac42063ce8dd57bf496bcdb1d7a9431317ee865b47076

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFq+dty:E5aIwC+Agr6SqCPGvTod

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks