General

  • Target

    4b4f2f412f66a07802e6403b6c8f4e70_NeikiAnalytics.exe

  • Size

    84KB

  • Sample

    240617-fffxxaygnn

  • MD5

    4b4f2f412f66a07802e6403b6c8f4e70

  • SHA1

    0ae1314bdb6659e09fb4c253a74c09ec8cd17f4f

  • SHA256

    07315589e4abc58223e9b193c19436656d05dd687a7253a4cbef0935f92957d4

  • SHA512

    3c80cfb8a40ad2556fd4078a40495f91ee53debb46192da248db155c69b329af6dd7b7e0dd14627327d684f33f4f456c8784a497cf7ed88804cdae99f9eeed23

  • SSDEEP

    1536:4Xn1JYSnExFkcgKKjxfmqshiKW5Xs/iYQqQJtsWFcdfRMvb+xWvD:WE3x5KBDYiKWm/iSw0fRMvygr

Score
8/10

Malware Config

Targets

    • Target

      4b4f2f412f66a07802e6403b6c8f4e70_NeikiAnalytics.exe

    • Size

      84KB

    • MD5

      4b4f2f412f66a07802e6403b6c8f4e70

    • SHA1

      0ae1314bdb6659e09fb4c253a74c09ec8cd17f4f

    • SHA256

      07315589e4abc58223e9b193c19436656d05dd687a7253a4cbef0935f92957d4

    • SHA512

      3c80cfb8a40ad2556fd4078a40495f91ee53debb46192da248db155c69b329af6dd7b7e0dd14627327d684f33f4f456c8784a497cf7ed88804cdae99f9eeed23

    • SSDEEP

      1536:4Xn1JYSnExFkcgKKjxfmqshiKW5Xs/iYQqQJtsWFcdfRMvb+xWvD:WE3x5KBDYiKWm/iSw0fRMvygr

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

MITRE ATT&CK Enterprise v15

Tasks