General
-
Target
498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe
-
Size
1.0MB
-
Sample
240612-2gayyatapg
-
MD5
498e3f2d908ce17d520c80e8e1d97710
-
SHA1
809be62eec8ae9c5b5daef7e6eb7de97dea2e459
-
SHA256
7cf2b75bfdb06b745cfa5dea58aad9790ff832f9fa78d8682ab84b816d5cf2b5
-
SHA512
b0ab40e1462ece7fa287abe774aed384797267f96b04111a714628555d34686b944981148cc7bb0da9385d596895b90cdac42aceec5438de2447ab00a4bb90cf
-
SSDEEP
12288:/ubxAa9sUFxZ8oq7URPvyKBozWeL+vSgmtjJcDVrCTZSXlVB0mGEB0aNN/cPUeWl:g9sUFxZq7URPt6RL6nBrEZUjGE/L8YZ
Behavioral task
behavioral1
Sample
498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
498e3f2d908ce17d520c80e8e1d97710
-
SHA1
809be62eec8ae9c5b5daef7e6eb7de97dea2e459
-
SHA256
7cf2b75bfdb06b745cfa5dea58aad9790ff832f9fa78d8682ab84b816d5cf2b5
-
SHA512
b0ab40e1462ece7fa287abe774aed384797267f96b04111a714628555d34686b944981148cc7bb0da9385d596895b90cdac42aceec5438de2447ab00a4bb90cf
-
SSDEEP
12288:/ubxAa9sUFxZ8oq7URPvyKBozWeL+vSgmtjJcDVrCTZSXlVB0mGEB0aNN/cPUeWl:g9sUFxZq7URPt6RL6nBrEZUjGE/L8YZ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1