General

  • Target

    0ecfe044265d75308af5f4195a9dd647ae1299651a0d24c2d58c73d1c523ed08_NeikiAnalytics.exe

  • Size

    4.4MB

  • Sample

    240628-yx89wstepp

  • MD5

    4970d0955c11c640bd3616f136211e90

  • SHA1

    05e4966f7a5da9dbc4758e72639f1497ae9a6da0

  • SHA256

    0ecfe044265d75308af5f4195a9dd647ae1299651a0d24c2d58c73d1c523ed08

  • SHA512

    c02adab04a6113d57464de1698a832a299db8f20b8db0b9f546a7bcef443adb73a0875a01fa7656771ac71ad80ca56fd1d020eff71347e4a924aa9c8a904d476

  • SSDEEP

    98304:EYSJEVsF0vujuwWxry+/r4+MYzLC2AXn7pcw39DZnH:EYZVsF0vaBcO+/hZALpc4DZnH

Malware Config

Targets

    • Target

      0ecfe044265d75308af5f4195a9dd647ae1299651a0d24c2d58c73d1c523ed08_NeikiAnalytics.exe

    • Size

      4.4MB

    • MD5

      4970d0955c11c640bd3616f136211e90

    • SHA1

      05e4966f7a5da9dbc4758e72639f1497ae9a6da0

    • SHA256

      0ecfe044265d75308af5f4195a9dd647ae1299651a0d24c2d58c73d1c523ed08

    • SHA512

      c02adab04a6113d57464de1698a832a299db8f20b8db0b9f546a7bcef443adb73a0875a01fa7656771ac71ad80ca56fd1d020eff71347e4a924aa9c8a904d476

    • SSDEEP

      98304:EYSJEVsF0vujuwWxry+/r4+MYzLC2AXn7pcw39DZnH:EYZVsF0vaBcO+/hZALpc4DZnH

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks