General

  • Target

    2af7826b803c1f5fba3e23b9b3de82f0_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240611-g8smvaxemh

  • MD5

    2af7826b803c1f5fba3e23b9b3de82f0

  • SHA1

    9697a486c709cc061ed64ed376cab7d4af122986

  • SHA256

    2cb0b6c1f841332c7ba8cadcf7f33765eb4bfc89f32286d3febdc0c0c99bf3fa

  • SHA512

    119588fbfa918e620fb46103f55909453e1471dd4cb61ce59f1cfb49e8a1d8a837952f820500639207dcef2fb8ea7500e5a0d224f73c51fd9191cd88d3091a7e

  • SSDEEP

    24576:Kr6ZB3xC3Bjut2ERKRJ+ZF3GwvNhi/hPvP6qVj9YuhmqKEJNDA+mFR9br:KmPx0uMEQJ+ZF2UNiFP3SjE8zR1

Malware Config

Targets

    • Target

      2af7826b803c1f5fba3e23b9b3de82f0_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      2af7826b803c1f5fba3e23b9b3de82f0

    • SHA1

      9697a486c709cc061ed64ed376cab7d4af122986

    • SHA256

      2cb0b6c1f841332c7ba8cadcf7f33765eb4bfc89f32286d3febdc0c0c99bf3fa

    • SHA512

      119588fbfa918e620fb46103f55909453e1471dd4cb61ce59f1cfb49e8a1d8a837952f820500639207dcef2fb8ea7500e5a0d224f73c51fd9191cd88d3091a7e

    • SSDEEP

      24576:Kr6ZB3xC3Bjut2ERKRJ+ZF3GwvNhi/hPvP6qVj9YuhmqKEJNDA+mFR9br:KmPx0uMEQJ+ZF2UNiFP3SjE8zR1

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks