General
-
Target
4edf621c7c0cb89ebe10551bbdd6e050_NeikiAnalytics.exe
-
Size
115KB
-
Sample
240618-rfkfwaxanc
-
MD5
4edf621c7c0cb89ebe10551bbdd6e050
-
SHA1
afa750d4b9fa427a6198808b49531122dc4c1164
-
SHA256
e26f77bde112ba428adf1e83d1118c331159334abd4d32fbba0edc244fa60a81
-
SHA512
63ad0393182a31e281685d848dd7a4796e78e249d241df363c5db72aa80e53d36880718f5c74db715870af04d109727369743368d374a6f3247a5ec5dd32bc65
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLirt:P5eznsjsguGDFqGZ2rDL0
Static task
static1
Behavioral task
behavioral1
Sample
4edf621c7c0cb89ebe10551bbdd6e050_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4edf621c7c0cb89ebe10551bbdd6e050_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
4edf621c7c0cb89ebe10551bbdd6e050_NeikiAnalytics.exe
-
Size
115KB
-
MD5
4edf621c7c0cb89ebe10551bbdd6e050
-
SHA1
afa750d4b9fa427a6198808b49531122dc4c1164
-
SHA256
e26f77bde112ba428adf1e83d1118c331159334abd4d32fbba0edc244fa60a81
-
SHA512
63ad0393182a31e281685d848dd7a4796e78e249d241df363c5db72aa80e53d36880718f5c74db715870af04d109727369743368d374a6f3247a5ec5dd32bc65
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLirt:P5eznsjsguGDFqGZ2rDL0
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1