General

  • Target

    3867ac55a453a3975ccd31920e4762e333009f0e19b4b997818bc89700fa508c_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240624-d7bfdszcqn

  • MD5

    6b5ab32a1ff2285454569c29d96121f0

  • SHA1

    38b9f7622cf98d97888c66d70ddcce8024e9a840

  • SHA256

    3867ac55a453a3975ccd31920e4762e333009f0e19b4b997818bc89700fa508c

  • SHA512

    2cc1aa384a96b4c91a66155c1546ec317ebc8751499dce15eab7dd46f9f0272da6b698b852742fbc94a0a0b2c628a32fa01d9097c488840c144e3ac4f84096c6

  • SSDEEP

    24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHo:bTO7Asmw4gxeOw46fUbNecCCFbNec9

Malware Config

Targets

    • Target

      3867ac55a453a3975ccd31920e4762e333009f0e19b4b997818bc89700fa508c_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      6b5ab32a1ff2285454569c29d96121f0

    • SHA1

      38b9f7622cf98d97888c66d70ddcce8024e9a840

    • SHA256

      3867ac55a453a3975ccd31920e4762e333009f0e19b4b997818bc89700fa508c

    • SHA512

      2cc1aa384a96b4c91a66155c1546ec317ebc8751499dce15eab7dd46f9f0272da6b698b852742fbc94a0a0b2c628a32fa01d9097c488840c144e3ac4f84096c6

    • SSDEEP

      24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHo:bTO7Asmw4gxeOw46fUbNecCCFbNec9

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

4
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks