General

  • Target

    1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb_NeikiAnalytics.exe

  • Size

    2.6MB

  • Sample

    240623-21cxmszglq

  • MD5

    36241015273142ee5bb9303fd3beeb70

  • SHA1

    a28c192bc7e4d9f4bc8946f7c4642920cf572525

  • SHA256

    1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb

  • SHA512

    819c537f25c0a2fce503c632af7705ece1472efada970ba64b30dfa43afe7f512949e7dcb6cea1cfc1d00b8c45ce655cd4091ac3b35d615211f2f7371d8297ab

  • SSDEEP

    49152:YXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVh:YXzhW148Pd+Tf1mpcOldJQ3/Vh

Malware Config

Targets

    • Target

      1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb_NeikiAnalytics.exe

    • Size

      2.6MB

    • MD5

      36241015273142ee5bb9303fd3beeb70

    • SHA1

      a28c192bc7e4d9f4bc8946f7c4642920cf572525

    • SHA256

      1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb

    • SHA512

      819c537f25c0a2fce503c632af7705ece1472efada970ba64b30dfa43afe7f512949e7dcb6cea1cfc1d00b8c45ce655cd4091ac3b35d615211f2f7371d8297ab

    • SSDEEP

      49152:YXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVh:YXzhW148Pd+Tf1mpcOldJQ3/Vh

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks