General

  • Target

    0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240604-2awxtsde2z

  • MD5

    0e344c9e21a34872c00333e37372a6a0

  • SHA1

    03485f15cfd96d90502a060e1c9ebc42499aa6f8

  • SHA256

    89c60b82afbf0756ea95d7c13aa38ac57cf8f5e30f9b6c52f7c8b2aecb6ca76a

  • SHA512

    de43bb5472d4dbce194f34975fd4e1da26358e226d3662498e498456a3e00e17fc0c6e2cebd2dd1a4f9116f6c62cf987ec6132f7297018764bf0711177be042d

  • SSDEEP

    12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JpPf:zQ5aILMCfmAUjzX6xQtjmssdqJih

Malware Config

Targets

    • Target

      0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      0e344c9e21a34872c00333e37372a6a0

    • SHA1

      03485f15cfd96d90502a060e1c9ebc42499aa6f8

    • SHA256

      89c60b82afbf0756ea95d7c13aa38ac57cf8f5e30f9b6c52f7c8b2aecb6ca76a

    • SHA512

      de43bb5472d4dbce194f34975fd4e1da26358e226d3662498e498456a3e00e17fc0c6e2cebd2dd1a4f9116f6c62cf987ec6132f7297018764bf0711177be042d

    • SSDEEP

      12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JpPf:zQ5aILMCfmAUjzX6xQtjmssdqJih

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks