General
-
Target
1900eaea8cff6a9c904585b1e7596210_NeikiAnalytics
-
Size
1.4MB
-
Sample
240509-21yt4sbh9t
-
MD5
1900eaea8cff6a9c904585b1e7596210
-
SHA1
a5f77afe1b82e5b1be1ce20d29471603e3b679e7
-
SHA256
b963aad415b8ae24e558c694c55fa5ad0afdc4a4c430fdf6fb1df126b85e5fa2
-
SHA512
10a552fdbb877165002b2b76f3af60b27101338eaab57c59825ab13e5e5cb74794256508da66912aff2e49241ffcaf82888467eaab4bb6a5a06f0f4c30a122df
-
SSDEEP
24576:JBu/EWtpkSmaYvY9/7WL0/F1hW5AAQ77sCfaZ7O5mbNZGgVwkjmEtaKx1yWeps:Pupvcc9qL4rWjQ7vLmbNZz+dE7rZ
Behavioral task
behavioral1
Sample
1900eaea8cff6a9c904585b1e7596210_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1900eaea8cff6a9c904585b1e7596210_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
1900eaea8cff6a9c904585b1e7596210_NeikiAnalytics
-
Size
1.4MB
-
MD5
1900eaea8cff6a9c904585b1e7596210
-
SHA1
a5f77afe1b82e5b1be1ce20d29471603e3b679e7
-
SHA256
b963aad415b8ae24e558c694c55fa5ad0afdc4a4c430fdf6fb1df126b85e5fa2
-
SHA512
10a552fdbb877165002b2b76f3af60b27101338eaab57c59825ab13e5e5cb74794256508da66912aff2e49241ffcaf82888467eaab4bb6a5a06f0f4c30a122df
-
SSDEEP
24576:JBu/EWtpkSmaYvY9/7WL0/F1hW5AAQ77sCfaZ7O5mbNZGgVwkjmEtaKx1yWeps:Pupvcc9qL4rWjQ7vLmbNZz+dE7rZ
Score7/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-