General

  • Target

    4c5168b1fc3c19269b4a0b4169efcef0_NeikiAnalytics.exe

  • Size

    47KB

  • Sample

    240607-l2v7lsff54

  • MD5

    4c5168b1fc3c19269b4a0b4169efcef0

  • SHA1

    25cc8589db2cc5994016c3104572ff678f4f2dae

  • SHA256

    bde581b04681da7683f1830c359b87a0484d36633956fd39f0125a8e9b7f2254

  • SHA512

    dab29e52ecda3de1f3e3e3857801a43680e085b53daf47ea405caf5079b05a5849c16950bcd745646f89f4e4c48d1a8cfea6cff030903ed700efcf1ec5f95f6b

  • SSDEEP

    768:IuYC9T3kH1jWUvTqRmo2qb6ot3ubOgAfxzb0PI7f6J0bWuxtMbaY7dxF/vqBDZox:IuYC9T34y2YoOgAf77yubW4waMxV0dox

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:883

Mutex

QAYVOGQLOpKd

Attributes
  • delay

    3

  • install

    true

  • install_file

    flash btc (core network).exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4c5168b1fc3c19269b4a0b4169efcef0_NeikiAnalytics.exe

    • Size

      47KB

    • MD5

      4c5168b1fc3c19269b4a0b4169efcef0

    • SHA1

      25cc8589db2cc5994016c3104572ff678f4f2dae

    • SHA256

      bde581b04681da7683f1830c359b87a0484d36633956fd39f0125a8e9b7f2254

    • SHA512

      dab29e52ecda3de1f3e3e3857801a43680e085b53daf47ea405caf5079b05a5849c16950bcd745646f89f4e4c48d1a8cfea6cff030903ed700efcf1ec5f95f6b

    • SSDEEP

      768:IuYC9T3kH1jWUvTqRmo2qb6ot3ubOgAfxzb0PI7f6J0bWuxtMbaY7dxF/vqBDZox:IuYC9T34y2YoOgAf77yubW4waMxV0dox

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks