General

  • Target

    4a70ec12e64d1c30d07862ae2293955bfe5ea4b3a1e137e3d8c94a0f10901725_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240629-cecx3s1gmm

  • MD5

    d134cfffeecfb01037177ccec5e5f0b0

  • SHA1

    07aed9d5740d6ea54e820943426d86ef3a5f6a6d

  • SHA256

    4a70ec12e64d1c30d07862ae2293955bfe5ea4b3a1e137e3d8c94a0f10901725

  • SHA512

    7d113ac14735d0457f2888f8ac0302226ce941c4aed3ec951a4238749a614540208f0d614fdcfdbe07e77977d91b0fbaaeaa33dfb6c89aea2a972d7844ebdc97

  • SSDEEP

    49152:Y05f3Q60NQ2ByAzvdYPxus6cF47Vkj7URLHkJigQU/CIabjKoh9WINX:FQ6+Q2ByAzvdYPAxeQDbrFIabjKoh9Wa

Malware Config

Targets

    • Target

      4a70ec12e64d1c30d07862ae2293955bfe5ea4b3a1e137e3d8c94a0f10901725_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      d134cfffeecfb01037177ccec5e5f0b0

    • SHA1

      07aed9d5740d6ea54e820943426d86ef3a5f6a6d

    • SHA256

      4a70ec12e64d1c30d07862ae2293955bfe5ea4b3a1e137e3d8c94a0f10901725

    • SHA512

      7d113ac14735d0457f2888f8ac0302226ce941c4aed3ec951a4238749a614540208f0d614fdcfdbe07e77977d91b0fbaaeaa33dfb6c89aea2a972d7844ebdc97

    • SSDEEP

      49152:Y05f3Q60NQ2ByAzvdYPxus6cF47Vkj7URLHkJigQU/CIabjKoh9WINX:FQ6+Q2ByAzvdYPAxeQDbrFIabjKoh9Wa

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Browser Extensions

1
T1176

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Defense Evasion

Modify Registry

1
T1112

Tasks