General

  • Target

    b1c239811ad1bef44d91fe3d86c0ceb0_NeikiAnalytics

  • Size

    232KB

  • Sample

    240511-n3vctahg72

  • MD5

    b1c239811ad1bef44d91fe3d86c0ceb0

  • SHA1

    d48dcc375cee070914ff2b3e30c56799d3a2c3c9

  • SHA256

    333233b96941ccee183dfbe2524b8cee133a091abdbc5ad75a40c31014261ed9

  • SHA512

    c3a07ad201efee7ea6ce40ba591566c26820098f4a6bdc88d600efee39c398edc76969d2ccc558bde5d2c80f17a2bce780830f97e46704f6c86f0cef47381d56

  • SSDEEP

    6144:RqlIyFESWu0SWuGSSqlIyFESWu0SWuGSu:ty0yo

Score
9/10

Malware Config

Targets

    • Target

      b1c239811ad1bef44d91fe3d86c0ceb0_NeikiAnalytics

    • Size

      232KB

    • MD5

      b1c239811ad1bef44d91fe3d86c0ceb0

    • SHA1

      d48dcc375cee070914ff2b3e30c56799d3a2c3c9

    • SHA256

      333233b96941ccee183dfbe2524b8cee133a091abdbc5ad75a40c31014261ed9

    • SHA512

      c3a07ad201efee7ea6ce40ba591566c26820098f4a6bdc88d600efee39c398edc76969d2ccc558bde5d2c80f17a2bce780830f97e46704f6c86f0cef47381d56

    • SSDEEP

      6144:RqlIyFESWu0SWuGSSqlIyFESWu0SWuGSu:ty0yo

    Score
    9/10
    • Renames multiple (3842) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks