General
-
Target
8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI
-
Size
95KB
-
Sample
240508-22gbfseg64
-
MD5
8d6b9e4f8be7ff79d3fe7c18a49dd3b0
-
SHA1
d1dac41341a05b7abb3ebcadf63c02e4cd74ba72
-
SHA256
2a9eea315eeeb6558e0f58d5a95661b3722e33d1368968eca226ff980450dd36
-
SHA512
c878b64f19fc28ffc1eb10f766e2be205f249d0379711c221f60a5e74a137851c65b1955f4f04ebb34e504deaf005c0e4f5c13a8feda97a97da545784dcdf7ed
-
SSDEEP
768:3/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pe:3RsvcdcQjosnvng6uQ1Jx
Static task
static1
Behavioral task
behavioral1
Sample
8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
8d6b9e4f8be7ff79d3fe7c18a49dd3b0_NEIKI
-
Size
95KB
-
MD5
8d6b9e4f8be7ff79d3fe7c18a49dd3b0
-
SHA1
d1dac41341a05b7abb3ebcadf63c02e4cd74ba72
-
SHA256
2a9eea315eeeb6558e0f58d5a95661b3722e33d1368968eca226ff980450dd36
-
SHA512
c878b64f19fc28ffc1eb10f766e2be205f249d0379711c221f60a5e74a137851c65b1955f4f04ebb34e504deaf005c0e4f5c13a8feda97a97da545784dcdf7ed
-
SSDEEP
768:3/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pe:3RsvcdcQjosnvng6uQ1Jx
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-