General
-
Target
65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics
-
Size
140KB
-
Sample
240511-dlynsshg6z
-
MD5
65e99e7e80a53b31a6648ead10acd0f0
-
SHA1
eb8606e4337a7860316b8aec539294fca71e6cb3
-
SHA256
85c692aca941e54f0cebb1f5a59585367e5f81e44fff8c55b841f5c94b7d6314
-
SHA512
0a9ee6da12cb17403debbf3b4670a6ca1fd5059d8bb33aff911a69b017349a21847382fd4aa0388c691ff741a09433d49cd94f003a5d70c8d5aacc95a2c0e268
-
SSDEEP
1536:0rRVCaKgzbLc54hukfgvYnouy8F/VW7nSm70zBVG/1pw5ZtwuL8UlS:0ljbLl/gvQoutFg70zzG/1e2zH
Behavioral task
behavioral1
Sample
65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics
-
Size
140KB
-
MD5
65e99e7e80a53b31a6648ead10acd0f0
-
SHA1
eb8606e4337a7860316b8aec539294fca71e6cb3
-
SHA256
85c692aca941e54f0cebb1f5a59585367e5f81e44fff8c55b841f5c94b7d6314
-
SHA512
0a9ee6da12cb17403debbf3b4670a6ca1fd5059d8bb33aff911a69b017349a21847382fd4aa0388c691ff741a09433d49cd94f003a5d70c8d5aacc95a2c0e268
-
SSDEEP
1536:0rRVCaKgzbLc54hukfgvYnouy8F/VW7nSm70zBVG/1pw5ZtwuL8UlS:0ljbLl/gvQoutFg70zzG/1e2zH
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-