General

  • Target

    222c56746d1f14be2f1346c3830e884ef2cef273b3ca30b3fce1d90a2b743a92_NeikiAnalytics.exe

  • Size

    3.2MB

  • Sample

    240630-28y5vaydna

  • MD5

    c2cbd2798ef5acd702b577f2576ed060

  • SHA1

    9d7d4d90feb8bf94d9dc427d014c05104f9d2636

  • SHA256

    222c56746d1f14be2f1346c3830e884ef2cef273b3ca30b3fce1d90a2b743a92

  • SHA512

    e1c3b92b8f838e4f314c51b64fd2d675d30fa4426d9db9d734bea60657b3a0cc02019e316c8286f24a3b55d2208ede8feae69c51a0e8c482b566e278e3f41d9a

  • SSDEEP

    49152:JeuSg2T/EoaN+jilNWh8wcepVXF7O36j+yY9/4kUaAPsFVttNb+6r9Hg0hh/RW5/:0g2T/d88UI173j09/3EK+Y9Hg07R0

Malware Config

Targets

    • Target

      222c56746d1f14be2f1346c3830e884ef2cef273b3ca30b3fce1d90a2b743a92_NeikiAnalytics.exe

    • Size

      3.2MB

    • MD5

      c2cbd2798ef5acd702b577f2576ed060

    • SHA1

      9d7d4d90feb8bf94d9dc427d014c05104f9d2636

    • SHA256

      222c56746d1f14be2f1346c3830e884ef2cef273b3ca30b3fce1d90a2b743a92

    • SHA512

      e1c3b92b8f838e4f314c51b64fd2d675d30fa4426d9db9d734bea60657b3a0cc02019e316c8286f24a3b55d2208ede8feae69c51a0e8c482b566e278e3f41d9a

    • SSDEEP

      49152:JeuSg2T/EoaN+jilNWh8wcepVXF7O36j+yY9/4kUaAPsFVttNb+6r9Hg0hh/RW5/:0g2T/d88UI173j09/3EK+Y9Hg07R0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks