General

  • Target

    8e6ef963e3c7b65ed3d5438a022b14948ef7c7d8dd05ff30ad2f3812d6333fe0_NeikiAnalytics.exe

  • Size

    69KB

  • Sample

    240624-tt9c9svcqj

  • MD5

    421e4bab4bd81dd5508c00247b44f940

  • SHA1

    3688a94e54740296ebfa038fa09d16be3cf2625a

  • SHA256

    8e6ef963e3c7b65ed3d5438a022b14948ef7c7d8dd05ff30ad2f3812d6333fe0

  • SHA512

    5e74c5ab382df9b1ca8283caf461e8af06f8d35c042cd00dd6bc90b94f6f570363e2195bdece11b94b6bc13aa31dfc22d950c6b43072623e8b906fe573c4bbd0

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8x:Olg35GTslA5t3/w8x

Malware Config

Targets

    • Target

      8e6ef963e3c7b65ed3d5438a022b14948ef7c7d8dd05ff30ad2f3812d6333fe0_NeikiAnalytics.exe

    • Size

      69KB

    • MD5

      421e4bab4bd81dd5508c00247b44f940

    • SHA1

      3688a94e54740296ebfa038fa09d16be3cf2625a

    • SHA256

      8e6ef963e3c7b65ed3d5438a022b14948ef7c7d8dd05ff30ad2f3812d6333fe0

    • SHA512

      5e74c5ab382df9b1ca8283caf461e8af06f8d35c042cd00dd6bc90b94f6f570363e2195bdece11b94b6bc13aa31dfc22d950c6b43072623e8b906fe573c4bbd0

    • SSDEEP

      1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8x:Olg35GTslA5t3/w8x

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks