General
-
Target
2e1cc7d91fb1e2458c6689fbac06c0c0_NeikiAnalytics.exe
-
Size
2.3MB
-
Sample
240617-bv78gsxhpc
-
MD5
2e1cc7d91fb1e2458c6689fbac06c0c0
-
SHA1
813b9eae4aee0db0f14ca433818fd6b27fa7eba8
-
SHA256
edc08d2cf48260e8451bc47b08087cf666362a161001312477df5c9d0cf29a51
-
SHA512
c61f3fd6d3c5c543394f12344e8857a4e6e279542e448974a1d615c79bedc9f0192967d5adb4f6a34c0c3b827bde8819bc30c0c21bc3308dc637938488da7bfe
-
SSDEEP
12288:E4fdIgiPeXovF6rEpPLIW3jqQQ5a6XizzGnHWp+z2vSCa7BdhrtZj8Qtfs:E4fdqmiFhH3jsz+4SFa7rLZgQtk
Static task
static1
Behavioral task
behavioral1
Sample
2e1cc7d91fb1e2458c6689fbac06c0c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7446048205:AAH63tMdZbDRgkmzEm6-HCOpd5eAOzt7ZAQ/
Targets
-
-
Target
2e1cc7d91fb1e2458c6689fbac06c0c0_NeikiAnalytics.exe
-
Size
2.3MB
-
MD5
2e1cc7d91fb1e2458c6689fbac06c0c0
-
SHA1
813b9eae4aee0db0f14ca433818fd6b27fa7eba8
-
SHA256
edc08d2cf48260e8451bc47b08087cf666362a161001312477df5c9d0cf29a51
-
SHA512
c61f3fd6d3c5c543394f12344e8857a4e6e279542e448974a1d615c79bedc9f0192967d5adb4f6a34c0c3b827bde8819bc30c0c21bc3308dc637938488da7bfe
-
SSDEEP
12288:E4fdIgiPeXovF6rEpPLIW3jqQQ5a6XizzGnHWp+z2vSCa7BdhrtZj8Qtfs:E4fdqmiFhH3jsz+4SFa7rLZgQtk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1