General

  • Target

    ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba_NeikiAnalytics.exe

  • Size

    3.6MB

  • Sample

    240629-q8t1cayfjd

  • MD5

    b791e8bd8c7d20c1dc4ae429fd5c9510

  • SHA1

    364f775fbf6de3ff301789b2781554615fc06348

  • SHA256

    ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba

  • SHA512

    362d932e29a49be3a01b0adda636b4b182a8413f70c5557bf9106754f5aa18b3f5d9d2f15f27d74342f35940cb1ba89178f81deadad5a8c6fa27caa6b054065a

  • SSDEEP

    49152:ijkvhKZu1NYjxFF9JQHDI0lY2yLJ1rBMsohjGv/piXzN0tx4SnpUBO:ijk3Lq9YDDlfyfvv/n4Sp+

Malware Config

Targets

    • Target

      ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba_NeikiAnalytics.exe

    • Size

      3.6MB

    • MD5

      b791e8bd8c7d20c1dc4ae429fd5c9510

    • SHA1

      364f775fbf6de3ff301789b2781554615fc06348

    • SHA256

      ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba

    • SHA512

      362d932e29a49be3a01b0adda636b4b182a8413f70c5557bf9106754f5aa18b3f5d9d2f15f27d74342f35940cb1ba89178f81deadad5a8c6fa27caa6b054065a

    • SSDEEP

      49152:ijkvhKZu1NYjxFF9JQHDI0lY2yLJ1rBMsohjGv/piXzN0tx4SnpUBO:ijk3Lq9YDDlfyfvv/n4Sp+

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks