General

  • Target

    def8879284b4a252b4a901cc41bcfa30_NeikiAnalytics

  • Size

    57KB

  • Sample

    240509-yh42maee38

  • MD5

    def8879284b4a252b4a901cc41bcfa30

  • SHA1

    232f5bf183c37d70371a55562fa53eac7abaa9bf

  • SHA256

    712cb3779ba761c1435eb9736393fe2d01203bfdd47cf92a03544537b1f694da

  • SHA512

    e6b19a084d6d0b3a7fb84dedea3233cade3de5fb4cb2c224fb7dae2de1504657af0604d223904158f8a58f8bda198509f12ecce7e016be96d1a35b6592ac6fd6

  • SSDEEP

    1536:0MB82vyvDnKPg9xSGt43daa3pD2Gbw/AH9t:tlYDK4t43daaR2G5

Score
7/10

Malware Config

Targets

    • Target

      def8879284b4a252b4a901cc41bcfa30_NeikiAnalytics

    • Size

      57KB

    • MD5

      def8879284b4a252b4a901cc41bcfa30

    • SHA1

      232f5bf183c37d70371a55562fa53eac7abaa9bf

    • SHA256

      712cb3779ba761c1435eb9736393fe2d01203bfdd47cf92a03544537b1f694da

    • SHA512

      e6b19a084d6d0b3a7fb84dedea3233cade3de5fb4cb2c224fb7dae2de1504657af0604d223904158f8a58f8bda198509f12ecce7e016be96d1a35b6592ac6fd6

    • SSDEEP

      1536:0MB82vyvDnKPg9xSGt43daa3pD2Gbw/AH9t:tlYDK4t43daaR2G5

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks