General

  • Target

    6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240613-jxye3athnj

  • MD5

    6b5a7896debd0fb5839936dfd1735e00

  • SHA1

    4061d31c112a8af0a942acb78c57c92847e3e7bf

  • SHA256

    6fe8e8dbc6172e0e3ed76dba865035b711682482eae8bd22e833ae77240e2b4f

  • SHA512

    086adec939263d1fb8b86ac6dec8deb2f72062970b03403b3f4b74fe4efe4e6123f313313f5e9cfad8c9503a3ce0d0cc317a58b376a1e33dd462617b59d0f3b1

  • SSDEEP

    12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphZ:zQ5aILMCfmAUjzX6xQtjmssdqexO8

Malware Config

Targets

    • Target

      6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      6b5a7896debd0fb5839936dfd1735e00

    • SHA1

      4061d31c112a8af0a942acb78c57c92847e3e7bf

    • SHA256

      6fe8e8dbc6172e0e3ed76dba865035b711682482eae8bd22e833ae77240e2b4f

    • SHA512

      086adec939263d1fb8b86ac6dec8deb2f72062970b03403b3f4b74fe4efe4e6123f313313f5e9cfad8c9503a3ce0d0cc317a58b376a1e33dd462617b59d0f3b1

    • SSDEEP

      12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphZ:zQ5aILMCfmAUjzX6xQtjmssdqexO8

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks