General

  • Target

    286e0b921eae1216fbab93c1b3133fb0_NeikiAnalytics.exe

  • Size

    724KB

  • Sample

    240525-147ezsch48

  • MD5

    286e0b921eae1216fbab93c1b3133fb0

  • SHA1

    e6f432036da7a643777f9bfb7bc4eaffe6718d04

  • SHA256

    46bf1f7f9e77b068b52ff6c46f4e523b519dced30f4cfda49903b50f2ce5f0ee

  • SHA512

    5fc2afaa686a539f65452e9315b5b38d1655478f4e85f2f428d63079c8ffc29d62f0e92585a907bfd8b31735115dba9508810463d982a0b0cbdd3206d54bca1a

  • SSDEEP

    12288:lB6jfu9W5qVnpA1P9mTx87m7HGA04OBGaSuQalOZeW0dZNDX+pd167QhEQJ:n67MnVnpA1lmTx8MmA07AaSuDSwdzE6o

Malware Config

Targets

    • Target

      286e0b921eae1216fbab93c1b3133fb0_NeikiAnalytics.exe

    • Size

      724KB

    • MD5

      286e0b921eae1216fbab93c1b3133fb0

    • SHA1

      e6f432036da7a643777f9bfb7bc4eaffe6718d04

    • SHA256

      46bf1f7f9e77b068b52ff6c46f4e523b519dced30f4cfda49903b50f2ce5f0ee

    • SHA512

      5fc2afaa686a539f65452e9315b5b38d1655478f4e85f2f428d63079c8ffc29d62f0e92585a907bfd8b31735115dba9508810463d982a0b0cbdd3206d54bca1a

    • SSDEEP

      12288:lB6jfu9W5qVnpA1P9mTx87m7HGA04OBGaSuQalOZeW0dZNDX+pd167QhEQJ:n67MnVnpA1lmTx8MmA07AaSuDSwdzE6o

    • FakeAV, RogueAntivirus

      FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

    • FakeAV payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks