General
-
Target
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712_NeikiAnalytics.exe
-
Size
9.3MB
-
Sample
240626-dq2ags1gja
-
MD5
d32b6497f96085710fd6a1ad10e82330
-
SHA1
11af8afa2f63fd797e6dbe306ea8181c3480119a
-
SHA256
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712
-
SHA512
e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f
-
SSDEEP
98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD
Behavioral task
behavioral1
Sample
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1254543345703977021/GGEp1kTIdcnrlXbkstceRTKYL1MjeavIS4CYW77UE3k75CymaXcXytUfkZVnLNW1d_wt
Targets
-
-
Target
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712_NeikiAnalytics.exe
-
Size
9.3MB
-
MD5
d32b6497f96085710fd6a1ad10e82330
-
SHA1
11af8afa2f63fd797e6dbe306ea8181c3480119a
-
SHA256
429c2396e234402ecf200be749e737dd4f969c8457e50eec8cde4fe4b486d712
-
SHA512
e6eb4ec19ad1d3f813028428b81fc931bd6739845958b541c2b70425bed553910467c29df6ccdc0d6fb9cc30cca91491e632bb30e5cf38a2109b30dc9e014b2f
-
SSDEEP
98304:wsGLMqMUzFeUoGgcmmPsWvpIqGEV6wKIii8HlD+:EBMUzQyPsWvCqjsfD
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1