General

  • Target

    508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240701-n6zrpstemp

  • MD5

    01f4a1d4695f851b2d1d6d545cae22b0

  • SHA1

    28becd4aaccec6c9649a7ad9e00e0bd0cd8968a9

  • SHA256

    508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02

  • SHA512

    ad8fb28a307c2e9a98b33ac24f287b2237c3751416415002b6c09fac5504ea1ab4e3597d986c16e2b527b7a5cfd921283584c6148e6947a9146efdd0a9fd237b

  • SSDEEP

    1536:jSV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt9669/hl1+8:jSV5vn7N041QqhgN9/h7

Malware Config

Targets

    • Target

      508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      01f4a1d4695f851b2d1d6d545cae22b0

    • SHA1

      28becd4aaccec6c9649a7ad9e00e0bd0cd8968a9

    • SHA256

      508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02

    • SHA512

      ad8fb28a307c2e9a98b33ac24f287b2237c3751416415002b6c09fac5504ea1ab4e3597d986c16e2b527b7a5cfd921283584c6148e6947a9146efdd0a9fd237b

    • SSDEEP

      1536:jSV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt9669/hl1+8:jSV5vn7N041QqhgN9/h7

    • MetamorpherRAT

      Metamorpherrat is a hacking tool that has been around for a while since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks