General

  • Target

    39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe

  • Size

    858KB

  • Sample

    240701-ggftzaxfkh

  • MD5

    9385b14139f56fa7db4f0e6baa9204d0

  • SHA1

    4b18c25a5da353acd74024202cbe16c4abb8e461

  • SHA256

    39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf

  • SHA512

    48482ad519c9f2f9b872e02e7c99c28f9247cd1244c8a0b47873c69e2ea6029df0bbf7e285bce8c1c9c8b95b3d1486ff710e805b999623bd8770c542f4225380

  • SSDEEP

    24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PP9:/EN973PvEL2wHBODLcPV

Malware Config

Targets

    • Target

      39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe

    • Size

      858KB

    • MD5

      9385b14139f56fa7db4f0e6baa9204d0

    • SHA1

      4b18c25a5da353acd74024202cbe16c4abb8e461

    • SHA256

      39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf

    • SHA512

      48482ad519c9f2f9b872e02e7c99c28f9247cd1244c8a0b47873c69e2ea6029df0bbf7e285bce8c1c9c8b95b3d1486ff710e805b999623bd8770c542f4225380

    • SSDEEP

      24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PP9:/EN973PvEL2wHBODLcPV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks