General

  • Target

    33a1779ff915f02eb08e6e3b01e19f94471bdca6e67ddde7fb13daea7d5541ff_NeikiAnalytics.exe

  • Size

    145KB

  • Sample

    240701-ejn71syflq

  • MD5

    cae867a6a367b6d681141949107407d0

  • SHA1

    b9fe182872bae50ce29b1c93a7aee20d4607c954

  • SHA256

    33a1779ff915f02eb08e6e3b01e19f94471bdca6e67ddde7fb13daea7d5541ff

  • SHA512

    895d416f0869b59acef568b31461d96c89ed153fa1329b1ff5a08a8e398fbb653ebc4dde3508210e66aa9965ba34e8b624829c89bf96d4880683fd104ece97f2

  • SSDEEP

    3072:M+i+kCsX/d4Gl2MUkLoXooFU6UK7q4+5DbGTO6GQd3JSZO5f7P:TifCs14GsMUk3oe6UK+42GTQMJSZO5fb

Score
10/10

Malware Config

Targets

    • Target

      33a1779ff915f02eb08e6e3b01e19f94471bdca6e67ddde7fb13daea7d5541ff_NeikiAnalytics.exe

    • Size

      145KB

    • MD5

      cae867a6a367b6d681141949107407d0

    • SHA1

      b9fe182872bae50ce29b1c93a7aee20d4607c954

    • SHA256

      33a1779ff915f02eb08e6e3b01e19f94471bdca6e67ddde7fb13daea7d5541ff

    • SHA512

      895d416f0869b59acef568b31461d96c89ed153fa1329b1ff5a08a8e398fbb653ebc4dde3508210e66aa9965ba34e8b624829c89bf96d4880683fd104ece97f2

    • SSDEEP

      3072:M+i+kCsX/d4Gl2MUkLoXooFU6UK7q4+5DbGTO6GQd3JSZO5f7P:TifCs14GsMUk3oe6UK+42GTQMJSZO5fb

    Score
    10/10
    • Adds autorun key to be loaded by Explorer.exe on startup

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks