General

  • Target

    4724c3c6a175b97434f210fd143dc410_NeikiAnalytics.exe

  • Size

    72KB

  • Sample

    240612-1qjf1avhqm

  • MD5

    4724c3c6a175b97434f210fd143dc410

  • SHA1

    ff635ce1d6a2c04be363c7636ecc5e374f06ada9

  • SHA256

    a5fad5c2a9c075dadf898770198a86c18468863fbdf28235e01308076af86c61

  • SHA512

    2fea1488cdc44eaba6b755b91215488106ef14ad89ed78307fa05cfb560739185cd5372e944a2abadfee21c31c1301372a3fb221f756967bb0fbf70c293915d9

  • SSDEEP

    1536:ymJ6BS7LL1X+o9yHSmj9yjdMGHb4c9PWJZ:yLBon1XJyHSI9idMYllWD

Score
10/10

Malware Config

Targets

    • Target

      4724c3c6a175b97434f210fd143dc410_NeikiAnalytics.exe

    • Size

      72KB

    • MD5

      4724c3c6a175b97434f210fd143dc410

    • SHA1

      ff635ce1d6a2c04be363c7636ecc5e374f06ada9

    • SHA256

      a5fad5c2a9c075dadf898770198a86c18468863fbdf28235e01308076af86c61

    • SHA512

      2fea1488cdc44eaba6b755b91215488106ef14ad89ed78307fa05cfb560739185cd5372e944a2abadfee21c31c1301372a3fb221f756967bb0fbf70c293915d9

    • SSDEEP

      1536:ymJ6BS7LL1X+o9yHSmj9yjdMGHb4c9PWJZ:yLBon1XJyHSI9idMYllWD

    Score
    10/10
    • Modifies firewall policy service

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks