General

  • Target

    1b33179cbbdbad9d649f3419cdfa54b1eca05cdf74e110abdfccd8505a743ea9_NeikiAnalytics.exe

  • Size

    45KB

  • Sample

    240620-adjccsxhrc

  • MD5

    2b4838ab12e093971a804245ec8473b0

  • SHA1

    51e6770c353ab26ae378437d6f518b0035d998da

  • SHA256

    1b33179cbbdbad9d649f3419cdfa54b1eca05cdf74e110abdfccd8505a743ea9

  • SHA512

    537e288dd67e5f3cbfd1e22463c92efa0c52afbd3253d9716f8431c7ecf05be027b2a3274a7591b6dd5fc90c7ad6e7be2dcbb33d333688d7271326dcf040f969

  • SSDEEP

    768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      1b33179cbbdbad9d649f3419cdfa54b1eca05cdf74e110abdfccd8505a743ea9_NeikiAnalytics.exe

    • Size

      45KB

    • MD5

      2b4838ab12e093971a804245ec8473b0

    • SHA1

      51e6770c353ab26ae378437d6f518b0035d998da

    • SHA256

      1b33179cbbdbad9d649f3419cdfa54b1eca05cdf74e110abdfccd8505a743ea9

    • SHA512

      537e288dd67e5f3cbfd1e22463c92efa0c52afbd3253d9716f8431c7ecf05be027b2a3274a7591b6dd5fc90c7ad6e7be2dcbb33d333688d7271326dcf040f969

    • SSDEEP

      768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks