General
-
Target
c9653588440ea3e16cb487733847fcf0_NEIKI
-
Size
3.8MB
-
Sample
240508-q11g6afd8w
-
MD5
c9653588440ea3e16cb487733847fcf0
-
SHA1
1ac6e80f7d3f7f933320ccb817b35d4e982e84a2
-
SHA256
b583051d4ffc47ff0ab7a3580d9fd0ee3a09f017f51a081512465ecef36e5f05
-
SHA512
0ec59292dcffd7d513ae1a74486f458b3ec33526c96e1548026192ac9729ead487c45781485ed3cb03cbef4a5b58dac924a9c79d9e8cec6a0d1051a0b77fc393
-
SSDEEP
98304:oJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXi:oJwakG4fYrq1HJvpliCQHawbzBbGSlaQ
Static task
static1
Behavioral task
behavioral1
Sample
c9653588440ea3e16cb487733847fcf0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9653588440ea3e16cb487733847fcf0_NEIKI.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
c9653588440ea3e16cb487733847fcf0_NEIKI
-
Size
3.8MB
-
MD5
c9653588440ea3e16cb487733847fcf0
-
SHA1
1ac6e80f7d3f7f933320ccb817b35d4e982e84a2
-
SHA256
b583051d4ffc47ff0ab7a3580d9fd0ee3a09f017f51a081512465ecef36e5f05
-
SHA512
0ec59292dcffd7d513ae1a74486f458b3ec33526c96e1548026192ac9729ead487c45781485ed3cb03cbef4a5b58dac924a9c79d9e8cec6a0d1051a0b77fc393
-
SSDEEP
98304:oJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXi:oJwakG4fYrq1HJvpliCQHawbzBbGSlaQ
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-