General

  • Target

    b2378ec37647920e0cc8390f4c18f58e459d195f64571549784d863f08b5c114_NeikiAnalytics.exe

  • Size

    3.8MB

  • Sample

    240629-td68zatelq

  • MD5

    7c9902a98086fe76efbefa47286034d0

  • SHA1

    bf567b360e085826b21e48ecd57fa8239a8eebb7

  • SHA256

    b2378ec37647920e0cc8390f4c18f58e459d195f64571549784d863f08b5c114

  • SHA512

    443b5191baba3f829b97a34acd24979bd9f530f4c247dfffec361101685a4d71fec49792f1d2b694e53c9c324a80e5ecb63e738fbdebb3be11f8bbc06dbcd6e7

  • SSDEEP

    49152:/Bxlt6fJdTFY1taOaU6xT6r4gkM/Ig2W152bQ77Z5zfZTj3i1IbIoS1cW99uThXz:LIZS18OCTqkqvOKZHvbhwcWKaQ+v0pi

Malware Config

Targets

    • Target

      b2378ec37647920e0cc8390f4c18f58e459d195f64571549784d863f08b5c114_NeikiAnalytics.exe

    • Size

      3.8MB

    • MD5

      7c9902a98086fe76efbefa47286034d0

    • SHA1

      bf567b360e085826b21e48ecd57fa8239a8eebb7

    • SHA256

      b2378ec37647920e0cc8390f4c18f58e459d195f64571549784d863f08b5c114

    • SHA512

      443b5191baba3f829b97a34acd24979bd9f530f4c247dfffec361101685a4d71fec49792f1d2b694e53c9c324a80e5ecb63e738fbdebb3be11f8bbc06dbcd6e7

    • SSDEEP

      49152:/Bxlt6fJdTFY1taOaU6xT6r4gkM/Ig2W152bQ77Z5zfZTj3i1IbIoS1cW99uThXz:LIZS18OCTqkqvOKZHvbhwcWKaQ+v0pi

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks