General

  • Target

    684e81e1d4d59bd45dd8f1078743ae2ac452618efd0ec4cfca448a3d1967fbac_NeikiAnalytics.exe

  • Size

    73KB

  • Sample

    240627-jt9zpazdpa

  • MD5

    83f7ca5b686c184e23ddc3958b51c200

  • SHA1

    e17afcab61042a7a22ae822f6ea1916491a0bf0a

  • SHA256

    684e81e1d4d59bd45dd8f1078743ae2ac452618efd0ec4cfca448a3d1967fbac

  • SHA512

    33541bf670fa4d2ace1cb9784a2aa89f2285704ee08c7bfe9a46437ad2fd7e440250d4fbfa6ab9c6509cc55014721b27bc38437111cc4baa8d6a04ec8f09ca06

  • SSDEEP

    1536:xbmCbyQvM4jA0oMYGy59Y7aSaT0BlOExfxIvkcyDR6ftBO7+Ri:YFQtjiM051j4BlOSfK1c8i

Malware Config

Targets

    • Target

      684e81e1d4d59bd45dd8f1078743ae2ac452618efd0ec4cfca448a3d1967fbac_NeikiAnalytics.exe

    • Size

      73KB

    • MD5

      83f7ca5b686c184e23ddc3958b51c200

    • SHA1

      e17afcab61042a7a22ae822f6ea1916491a0bf0a

    • SHA256

      684e81e1d4d59bd45dd8f1078743ae2ac452618efd0ec4cfca448a3d1967fbac

    • SHA512

      33541bf670fa4d2ace1cb9784a2aa89f2285704ee08c7bfe9a46437ad2fd7e440250d4fbfa6ab9c6509cc55014721b27bc38437111cc4baa8d6a04ec8f09ca06

    • SSDEEP

      1536:xbmCbyQvM4jA0oMYGy59Y7aSaT0BlOExfxIvkcyDR6ftBO7+Ri:YFQtjiM051j4BlOSfK1c8i

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks