General

  • Target

    31e36633563aada8cc0dcd991ab66ffdc876328d74b32c16de30028144ee2af0_NeikiAnalytics.exe

  • Size

    115KB

  • Sample

    240701-dyscjsyanq

  • MD5

    7b0e93ca864f013b63705250b8c0d830

  • SHA1

    9ac6884f996c2419f5bfd918120b0a74173b9e94

  • SHA256

    31e36633563aada8cc0dcd991ab66ffdc876328d74b32c16de30028144ee2af0

  • SHA512

    8f93847ca320e3b37714bda85f3cd434b3d1eed29126e628e78c671b34def85784cd42e5d5f691dbcae0573cc7573566e1afa0754d5e38b53a35436a52eae640

  • SSDEEP

    3072:OaUw7GPOFlRXzFW2VTbWymWU6SMQehalNgFuk0:l3RXzf6ymWU5MClN5

Score
10/10

Malware Config

Targets

    • Target

      31e36633563aada8cc0dcd991ab66ffdc876328d74b32c16de30028144ee2af0_NeikiAnalytics.exe

    • Size

      115KB

    • MD5

      7b0e93ca864f013b63705250b8c0d830

    • SHA1

      9ac6884f996c2419f5bfd918120b0a74173b9e94

    • SHA256

      31e36633563aada8cc0dcd991ab66ffdc876328d74b32c16de30028144ee2af0

    • SHA512

      8f93847ca320e3b37714bda85f3cd434b3d1eed29126e628e78c671b34def85784cd42e5d5f691dbcae0573cc7573566e1afa0754d5e38b53a35436a52eae640

    • SSDEEP

      3072:OaUw7GPOFlRXzFW2VTbWymWU6SMQehalNgFuk0:l3RXzf6ymWU5MClN5

    Score
    10/10
    • Adds autorun key to be loaded by Explorer.exe on startup

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks