General

  • Target

    3885ab0ba1f5696660edb2ff83f748f0_NeikiAnalytics.exe

  • Size

    1.3MB

  • Sample

    240531-w7pl5ahg33

  • MD5

    3885ab0ba1f5696660edb2ff83f748f0

  • SHA1

    9111c9ac9aae58821902c702d9c6cfa40a80635e

  • SHA256

    31d83642449bc805b39c3c96ede7eb92b0c1fe96e8e80a3668452549d9448bf9

  • SHA512

    f256e73c28c9ed0f4bb75bb0882f68c8a4920a3c31ef62f1a8943e089399551634643960dd84dee4a478d06244c33759136802698c2a813df712f3728d0b3bb7

  • SSDEEP

    24576:VaPnAOx5SUXJW/D4xUa38vKdTIkpgSWC+osF0jzZVb+t35cMYlG96NMBJMncaMvT:V0x5SUW/cxUitIGLsF0nb+tJVYleAMzH

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://2dbd-103-21-170-170.ngrok.io:80/Hth8

Attributes
  • headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)

Targets

    • Target

      3885ab0ba1f5696660edb2ff83f748f0_NeikiAnalytics.exe

    • Size

      1.3MB

    • MD5

      3885ab0ba1f5696660edb2ff83f748f0

    • SHA1

      9111c9ac9aae58821902c702d9c6cfa40a80635e

    • SHA256

      31d83642449bc805b39c3c96ede7eb92b0c1fe96e8e80a3668452549d9448bf9

    • SHA512

      f256e73c28c9ed0f4bb75bb0882f68c8a4920a3c31ef62f1a8943e089399551634643960dd84dee4a478d06244c33759136802698c2a813df712f3728d0b3bb7

    • SSDEEP

      24576:VaPnAOx5SUXJW/D4xUa38vKdTIkpgSWC+osF0jzZVb+t35cMYlG96NMBJMncaMvT:V0x5SUW/cxUitIGLsF0nb+tJVYleAMzH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks