General
-
Target
811f66fa14f932f74f348ec0471cf030_NeikiAnalytics.exe
-
Size
217KB
-
Sample
240531-1qgmeafe82
-
MD5
811f66fa14f932f74f348ec0471cf030
-
SHA1
45e99adf9a858d66bc4f9711664f554c7645e965
-
SHA256
31a0f98c37f0acc09888796e5a3829ee1478723d2005a67d531c13c9d419937a
-
SHA512
064808e14a1ed0878b8fca3002f458716b32c45706d128e6f3c5af78b299341b0b8ceded00a5be91d40af977adb08d648d03a8f8c540bc64ec3e447e371f76fd
-
SSDEEP
6144:KSy+bnr+Op0yN90QEzsUl1Xs93Le+Ixlh7:uMryy90ZsUc93LylB
Static task
static1
Malware Config
Targets
-
-
Target
811f66fa14f932f74f348ec0471cf030_NeikiAnalytics.exe
-
Size
217KB
-
MD5
811f66fa14f932f74f348ec0471cf030
-
SHA1
45e99adf9a858d66bc4f9711664f554c7645e965
-
SHA256
31a0f98c37f0acc09888796e5a3829ee1478723d2005a67d531c13c9d419937a
-
SHA512
064808e14a1ed0878b8fca3002f458716b32c45706d128e6f3c5af78b299341b0b8ceded00a5be91d40af977adb08d648d03a8f8c540bc64ec3e447e371f76fd
-
SSDEEP
6144:KSy+bnr+Op0yN90QEzsUl1Xs93Le+Ixlh7:uMryy90ZsUc93LylB
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1