General

  • Target

    622a43f56598daac4ce08b5403d62a50_NeikiAnalytics.exe

  • Size

    70KB

  • Sample

    240530-dtjvlsce5s

  • MD5

    622a43f56598daac4ce08b5403d62a50

  • SHA1

    8b86d546a235c545b7d711e3412675ad5e368a1e

  • SHA256

    1df680cd389e6a8538b77f783c349e40875d9578d7a9cc792ef47238147dda4e

  • SHA512

    550dc88354526be16f8706474fc0fd39144530b6380694a11a2471a8802d4b46c712b22f134b92969c4f18e0212c86c718f52b84e454261066a53d63d7335930

  • SSDEEP

    1536:1LHIlfH7Q6qRBwWa2qxQFZA+j6sCWw+9:1oS6qcWjqazp6s7R

Malware Config

Targets

    • Target

      622a43f56598daac4ce08b5403d62a50_NeikiAnalytics.exe

    • Size

      70KB

    • MD5

      622a43f56598daac4ce08b5403d62a50

    • SHA1

      8b86d546a235c545b7d711e3412675ad5e368a1e

    • SHA256

      1df680cd389e6a8538b77f783c349e40875d9578d7a9cc792ef47238147dda4e

    • SHA512

      550dc88354526be16f8706474fc0fd39144530b6380694a11a2471a8802d4b46c712b22f134b92969c4f18e0212c86c718f52b84e454261066a53d63d7335930

    • SSDEEP

      1536:1LHIlfH7Q6qRBwWa2qxQFZA+j6sCWw+9:1oS6qcWjqazp6s7R

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks