General

  • Target

    b787e5d3c5c35b811376806a8e7439ad5e31a3ce13535e473b8d27ddfc96cf58_NeikiAnalytics.exe

  • Size

    3.7MB

  • Sample

    240629-xb231swfnj

  • MD5

    6cf07c90c06ef6b59651f0820014eec0

  • SHA1

    c145ff82d48197a864a79bf65dd4372ac49e5e81

  • SHA256

    b787e5d3c5c35b811376806a8e7439ad5e31a3ce13535e473b8d27ddfc96cf58

  • SHA512

    0d5cc2f3e8285370837ec62cf0ef3cc37df956094e68e1e1a9d1288312bba7ddbbfe24f86e5e6d6fe5889c7e1e68501c07aa3e3316858a97a30ebce4e67b6019

  • SSDEEP

    98304:GAC03Pl03bUArPxs4FLkFKOisMENiJIxXqMUz:GAOoArpxJcXdNi8qz

Malware Config

Targets

    • Target

      b787e5d3c5c35b811376806a8e7439ad5e31a3ce13535e473b8d27ddfc96cf58_NeikiAnalytics.exe

    • Size

      3.7MB

    • MD5

      6cf07c90c06ef6b59651f0820014eec0

    • SHA1

      c145ff82d48197a864a79bf65dd4372ac49e5e81

    • SHA256

      b787e5d3c5c35b811376806a8e7439ad5e31a3ce13535e473b8d27ddfc96cf58

    • SHA512

      0d5cc2f3e8285370837ec62cf0ef3cc37df956094e68e1e1a9d1288312bba7ddbbfe24f86e5e6d6fe5889c7e1e68501c07aa3e3316858a97a30ebce4e67b6019

    • SSDEEP

      98304:GAC03Pl03bUArPxs4FLkFKOisMENiJIxXqMUz:GAOoArpxJcXdNi8qz

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks