General

  • Target

    aeb17ae4ca24de32667ed6760043d166ba57eb8cc94654c01426090e2f4df85a_NeikiAnalytics.exe

  • Size

    3.6MB

  • Sample

    240629-rfy92aygld

  • MD5

    42b67fe69d788d4313959f31cbbd4960

  • SHA1

    16ca959538658904bb3c2897846eea4f4afa169d

  • SHA256

    aeb17ae4ca24de32667ed6760043d166ba57eb8cc94654c01426090e2f4df85a

  • SHA512

    5e61872636f5a53725b57465e09a7e90f7876d50534cc058e9a62af004fb857e2ac9ae91bca3699ca737d3b7b593b6c37de91e35e7b50a2c868e2ef3c8155fcc

  • SSDEEP

    98304:TtsP3VHX+Ho0jpWOoK2yfzDixVRWhKFnHAOn/ZJE0w4Sib:TGP3VHmdsyfzDuRXjxnw5

Malware Config

Targets

    • Target

      aeb17ae4ca24de32667ed6760043d166ba57eb8cc94654c01426090e2f4df85a_NeikiAnalytics.exe

    • Size

      3.6MB

    • MD5

      42b67fe69d788d4313959f31cbbd4960

    • SHA1

      16ca959538658904bb3c2897846eea4f4afa169d

    • SHA256

      aeb17ae4ca24de32667ed6760043d166ba57eb8cc94654c01426090e2f4df85a

    • SHA512

      5e61872636f5a53725b57465e09a7e90f7876d50534cc058e9a62af004fb857e2ac9ae91bca3699ca737d3b7b593b6c37de91e35e7b50a2c868e2ef3c8155fcc

    • SSDEEP

      98304:TtsP3VHX+Ho0jpWOoK2yfzDixVRWhKFnHAOn/ZJE0w4Sib:TGP3VHmdsyfzDuRXjxnw5

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks