General

  • Target

    b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe

  • Size

    2.4MB

  • Sample

    240629-svhfhazfra

  • MD5

    f1bd5a01ef30b911e6434ca101a30510

  • SHA1

    154638461d818aeec509a7f774f98b7e66b84c8d

  • SHA256

    b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2

  • SHA512

    88dba9f0caef2056e275135aea8ff5cb017eb8b041deb7f3564d950c94debf23420e529e433571a47deba80755d7c221827158481610ba41461c502213e6003a

  • SSDEEP

    49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SB5:L3KkQMcNQlHG/oF8aUz0vnx9j

Malware Config

Targets

    • Target

      b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe

    • Size

      2.4MB

    • MD5

      f1bd5a01ef30b911e6434ca101a30510

    • SHA1

      154638461d818aeec509a7f774f98b7e66b84c8d

    • SHA256

      b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2

    • SHA512

      88dba9f0caef2056e275135aea8ff5cb017eb8b041deb7f3564d950c94debf23420e529e433571a47deba80755d7c221827158481610ba41461c502213e6003a

    • SSDEEP

      49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SB5:L3KkQMcNQlHG/oF8aUz0vnx9j

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks