General
-
Target
ddb3b2837980862d7962172bc89c24f0_NEIKI
-
Size
347KB
-
Sample
240508-fvdq4afa72
-
MD5
ddb3b2837980862d7962172bc89c24f0
-
SHA1
96746c72536004f31f11ed1cb0ca3bf248c61952
-
SHA256
5109349d132fa0f5747e48f6fdcd412c69f1cf675fec88e19e74ad9755922b80
-
SHA512
5dd8398463fbc3087a459afc539b842287798dde9f9ddef067c2052cca91ce43d64b03d6e5e9a4c1d08c77f455ac630140309aadbad468fe73f9865d7341c63a
-
SSDEEP
6144:8uIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYhuIlWqB+E:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4E
Behavioral task
behavioral1
Sample
ddb3b2837980862d7962172bc89c24f0_NEIKI.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
ddb3b2837980862d7962172bc89c24f0_NEIKI
-
Size
347KB
-
MD5
ddb3b2837980862d7962172bc89c24f0
-
SHA1
96746c72536004f31f11ed1cb0ca3bf248c61952
-
SHA256
5109349d132fa0f5747e48f6fdcd412c69f1cf675fec88e19e74ad9755922b80
-
SHA512
5dd8398463fbc3087a459afc539b842287798dde9f9ddef067c2052cca91ce43d64b03d6e5e9a4c1d08c77f455ac630140309aadbad468fe73f9865d7341c63a
-
SSDEEP
6144:8uIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYhuIlWqB+E:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4E
-
Modifies visibility of file extensions in Explorer
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-