General

  • Target

    4b3d26d4a1c7a0a362bae9d0d539cf9d6e83f9012ec33be3a3bfeda9406a67f0_NeikiAnalytics.exe

  • Size

    76KB

  • Sample

    240701-mm8ptszdnr

  • MD5

    bd97583ea33a565c106cb868fb1adcd0

  • SHA1

    f0c0b4d8b738039c61ae43a44499bd413994791a

  • SHA256

    4b3d26d4a1c7a0a362bae9d0d539cf9d6e83f9012ec33be3a3bfeda9406a67f0

  • SHA512

    475b344cfc10602aea5ccbeb28e0fdb83edc91690a8a29debc005b96a406d89c6090bed9ea69aed7088d20ac0d4174c6681e82666b6567c0f119516b269ea3e9

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZScBy:c8y93KQjy7G55riF1cMo03QcBy

Malware Config

Targets

    • Target

      4b3d26d4a1c7a0a362bae9d0d539cf9d6e83f9012ec33be3a3bfeda9406a67f0_NeikiAnalytics.exe

    • Size

      76KB

    • MD5

      bd97583ea33a565c106cb868fb1adcd0

    • SHA1

      f0c0b4d8b738039c61ae43a44499bd413994791a

    • SHA256

      4b3d26d4a1c7a0a362bae9d0d539cf9d6e83f9012ec33be3a3bfeda9406a67f0

    • SHA512

      475b344cfc10602aea5ccbeb28e0fdb83edc91690a8a29debc005b96a406d89c6090bed9ea69aed7088d20ac0d4174c6681e82666b6567c0f119516b269ea3e9

    • SSDEEP

      1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZScBy:c8y93KQjy7G55riF1cMo03QcBy

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Tasks