General

  • Target

    7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe

  • Size

    765KB

  • Sample

    240531-hpvhrsbd36

  • MD5

    7bbc50af11ca46a958cecb2898884860

  • SHA1

    3acad220a592a55cf544462bfa9cda995d62145c

  • SHA256

    5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e

  • SHA512

    d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687

  • SSDEEP

    12288:ChkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a36Ph9y2d71YlRC:iRmJkcoQricOIQxiZY1ia0yY71YlE

Malware Config

Targets

    • Target

      7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe

    • Size

      765KB

    • MD5

      7bbc50af11ca46a958cecb2898884860

    • SHA1

      3acad220a592a55cf544462bfa9cda995d62145c

    • SHA256

      5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e

    • SHA512

      d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687

    • SSDEEP

      12288:ChkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a36Ph9y2d71YlRC:iRmJkcoQricOIQxiZY1ia0yY71YlE

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks