General
-
Target
c9c8a5d58d675aa127db7e29a87b29b0_NeikiAnalytics
-
Size
2.7MB
-
Sample
240510-mznv7adf85
-
MD5
c9c8a5d58d675aa127db7e29a87b29b0
-
SHA1
5015306baba107b34295b3011ec1027352c2f293
-
SHA256
7b3c2fdda6b120d6d0855f9f4c95e423cdada7e91897560b55c2107d13bb50aa
-
SHA512
aee050ebcb459bf6c17da6dba135cfaaad57274f520b6f708be1b61757195d629e0de991d36a3da70e8d7057f945e569e1bfc81d304fca27b9404493660d254a
-
SSDEEP
49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/RcT:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rt
Behavioral task
behavioral1
Sample
c9c8a5d58d675aa127db7e29a87b29b0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9c8a5d58d675aa127db7e29a87b29b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
c9c8a5d58d675aa127db7e29a87b29b0_NeikiAnalytics
-
Size
2.7MB
-
MD5
c9c8a5d58d675aa127db7e29a87b29b0
-
SHA1
5015306baba107b34295b3011ec1027352c2f293
-
SHA256
7b3c2fdda6b120d6d0855f9f4c95e423cdada7e91897560b55c2107d13bb50aa
-
SHA512
aee050ebcb459bf6c17da6dba135cfaaad57274f520b6f708be1b61757195d629e0de991d36a3da70e8d7057f945e569e1bfc81d304fca27b9404493660d254a
-
SSDEEP
49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/RcT:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rt
Score10/10-
XMRig Miner payload
-
Blocklisted process makes network request
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-