General
-
Target
4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe
-
Size
232KB
-
Sample
240604-kxhkaaca64
-
MD5
4fb068470c1c5ef9cbfec68615bc40c0
-
SHA1
171d2253d481e1b670e734dcd667b5d002ff3daa
-
SHA256
d7920ba0b738757480f805f169ce3c2598b5d15eeb6eb00a504bc020660c7727
-
SHA512
8e33ecc09033d2916971433b73a465941c7efca2e64381ede946ff7a1365ef68a94bf1ebaf4ed086a16e69d9108dff6f47c5b13f44ac63664641302dc454c348
-
SSDEEP
6144:s1UDRcn5R2C1mZ7qAkklcFcwUZcFAVJKyIfgAB:s1eRC5T1mZ2pkqWVDIfgk
Static task
static1
Behavioral task
behavioral1
Sample
4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe
-
Size
232KB
-
MD5
4fb068470c1c5ef9cbfec68615bc40c0
-
SHA1
171d2253d481e1b670e734dcd667b5d002ff3daa
-
SHA256
d7920ba0b738757480f805f169ce3c2598b5d15eeb6eb00a504bc020660c7727
-
SHA512
8e33ecc09033d2916971433b73a465941c7efca2e64381ede946ff7a1365ef68a94bf1ebaf4ed086a16e69d9108dff6f47c5b13f44ac63664641302dc454c348
-
SSDEEP
6144:s1UDRcn5R2C1mZ7qAkklcFcwUZcFAVJKyIfgAB:s1eRC5T1mZ2pkqWVDIfgk
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1