General

  • Target

    22a895e25b8acaa71f9fcb6d4b27135ad32d018940ca005ea371ffa307bf6c3c_NeikiAnalytics.exe

  • Size

    3.3MB

  • Sample

    240630-3ea2layerf

  • MD5

    dcf0ad9bc2001ff5c57f945736f1e930

  • SHA1

    b087340d231020d71bc65fea0713faa8544e194e

  • SHA256

    22a895e25b8acaa71f9fcb6d4b27135ad32d018940ca005ea371ffa307bf6c3c

  • SHA512

    0cc5ad5b9abee7374480a75d3e15a08606d776640c462992002cd4f68e9ea7ac89f702b926ca1946107fbadf10235909ef067c81c28857062f209c50b2178744

  • SSDEEP

    49152:Ga6CRvxtxPv2ldN8CFZ0BYNPsMeyAbJTaKJp6O3wRSOg1VWCm/YtQm5wfdZ4sM:R6KbCXmaPsjbJZL6O3wRSO+Rmw5I/4

Malware Config

Targets

    • Target

      22a895e25b8acaa71f9fcb6d4b27135ad32d018940ca005ea371ffa307bf6c3c_NeikiAnalytics.exe

    • Size

      3.3MB

    • MD5

      dcf0ad9bc2001ff5c57f945736f1e930

    • SHA1

      b087340d231020d71bc65fea0713faa8544e194e

    • SHA256

      22a895e25b8acaa71f9fcb6d4b27135ad32d018940ca005ea371ffa307bf6c3c

    • SHA512

      0cc5ad5b9abee7374480a75d3e15a08606d776640c462992002cd4f68e9ea7ac89f702b926ca1946107fbadf10235909ef067c81c28857062f209c50b2178744

    • SSDEEP

      49152:Ga6CRvxtxPv2ldN8CFZ0BYNPsMeyAbJTaKJp6O3wRSOg1VWCm/YtQm5wfdZ4sM:R6KbCXmaPsjbJZL6O3wRSO+Rmw5I/4

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks