General

  • Target

    04af9171286cbc77247b56340d580000_NeikiAnalytics.exe

  • Size

    3.2MB

  • Sample

    240609-3mdsfshb47

  • MD5

    04af9171286cbc77247b56340d580000

  • SHA1

    9d4e93c1ea8d5e262060dba115494b1e62f6f9ac

  • SHA256

    040a4ba0cfc777c7b3983233cc8ab510783f135166d4d80d83d29080ca65c0bc

  • SHA512

    9c86066ab07adbbaeb848102c115a582de576a04c62c410d2173df05172b9396366838369549d2a26782ebe2c273c625de2c681f12f9e2a33f3e22c5bc5549bc

  • SSDEEP

    49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N

Malware Config

Targets

    • Target

      04af9171286cbc77247b56340d580000_NeikiAnalytics.exe

    • Size

      3.2MB

    • MD5

      04af9171286cbc77247b56340d580000

    • SHA1

      9d4e93c1ea8d5e262060dba115494b1e62f6f9ac

    • SHA256

      040a4ba0cfc777c7b3983233cc8ab510783f135166d4d80d83d29080ca65c0bc

    • SHA512

      9c86066ab07adbbaeb848102c115a582de576a04c62c410d2173df05172b9396366838369549d2a26782ebe2c273c625de2c681f12f9e2a33f3e22c5bc5549bc

    • SSDEEP

      49152:/C0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:/C0Fl8v/qXYrv5tG9uKJGAWl5N

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks