General

  • Target

    11060745e33b13bb2dd9a63ed44cce487d15cfbdaa3764b4650d659bd6cb8daf_NeikiAnalytics.exe

  • Size

    881KB

  • Sample

    240628-y589vstgmm

  • MD5

    e5ba25f6dff850ddaff8e6b07ecd44d0

  • SHA1

    916aef6ce2ba8516587657188654bb583737c61c

  • SHA256

    11060745e33b13bb2dd9a63ed44cce487d15cfbdaa3764b4650d659bd6cb8daf

  • SHA512

    38d544b8f81f4bf2af372411f2becbf716f76a18748370cd3305ca5b1b2bcfb88de0e083b87a9d2ae65592cc1ef8a4fd6c82f9159896994f61eb2e4f1eec4b5c

  • SSDEEP

    12288:4wCBtLC+EptUpQ9SeSChq3YvxFBSSRMT8PTp4ihozEN888888888888W8888888c:YNzCtUpQ9WWPBSSRMTEpXN4

Malware Config

Targets

    • Target

      11060745e33b13bb2dd9a63ed44cce487d15cfbdaa3764b4650d659bd6cb8daf_NeikiAnalytics.exe

    • Size

      881KB

    • MD5

      e5ba25f6dff850ddaff8e6b07ecd44d0

    • SHA1

      916aef6ce2ba8516587657188654bb583737c61c

    • SHA256

      11060745e33b13bb2dd9a63ed44cce487d15cfbdaa3764b4650d659bd6cb8daf

    • SHA512

      38d544b8f81f4bf2af372411f2becbf716f76a18748370cd3305ca5b1b2bcfb88de0e083b87a9d2ae65592cc1ef8a4fd6c82f9159896994f61eb2e4f1eec4b5c

    • SSDEEP

      12288:4wCBtLC+EptUpQ9SeSChq3YvxFBSSRMT8PTp4ihozEN888888888888W8888888c:YNzCtUpQ9WWPBSSRMTEpXN4

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks