General

  • Target

    20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240611-ap51haxbnm

  • MD5

    20b67549febb5f807d6d9a902d2e6260

  • SHA1

    084b80ecd5661bfa9604e6ebeb9026e0ae585c01

  • SHA256

    55da9e0e2a2c10ef69534c558e56c53fd81f22e7dc0b56dc55aa331bdf5f1122

  • SHA512

    74175563b9169b3c7755d2d6b190fa7e0f6b449e2539277ecab68c627cd70decd8bf62c164093168e27e631331decd8f35d2c23e7b7111c68a9bbab7197d640f

  • SSDEEP

    12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphX:zQ5aILMCfmAUjzX6xQtjmssdqexuXIf

Malware Config

Targets

    • Target

      20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      20b67549febb5f807d6d9a902d2e6260

    • SHA1

      084b80ecd5661bfa9604e6ebeb9026e0ae585c01

    • SHA256

      55da9e0e2a2c10ef69534c558e56c53fd81f22e7dc0b56dc55aa331bdf5f1122

    • SHA512

      74175563b9169b3c7755d2d6b190fa7e0f6b449e2539277ecab68c627cd70decd8bf62c164093168e27e631331decd8f35d2c23e7b7111c68a9bbab7197d640f

    • SSDEEP

      12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphX:zQ5aILMCfmAUjzX6xQtjmssdqexuXIf

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks