General
-
Target
04af9171286cbc77247b56340d580000_NeikiAnalytics.exe
-
Size
3.2MB
-
Sample
240609-3mdsfshb47
-
MD5
04af9171286cbc77247b56340d580000
-
SHA1
9d4e93c1ea8d5e262060dba115494b1e62f6f9ac
-
SHA256
040a4ba0cfc777c7b3983233cc8ab510783f135166d4d80d83d29080ca65c0bc
-
SHA512
9c86066ab07adbbaeb848102c115a582de576a04c62c410d2173df05172b9396366838369549d2a26782ebe2c273c625de2c681f12f9e2a33f3e22c5bc5549bc
-
SSDEEP
49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N
Behavioral task
behavioral1
Sample
04af9171286cbc77247b56340d580000_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
04af9171286cbc77247b56340d580000_NeikiAnalytics.exe
-
Size
3.2MB
-
MD5
04af9171286cbc77247b56340d580000
-
SHA1
9d4e93c1ea8d5e262060dba115494b1e62f6f9ac
-
SHA256
040a4ba0cfc777c7b3983233cc8ab510783f135166d4d80d83d29080ca65c0bc
-
SHA512
9c86066ab07adbbaeb848102c115a582de576a04c62c410d2173df05172b9396366838369549d2a26782ebe2c273c625de2c681f12f9e2a33f3e22c5bc5549bc
-
SSDEEP
49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1