General
-
Target
309a885cde51c3a333adaae4437037e0_NeikiAnalytics
-
Size
1.1MB
-
Sample
240511-ye2r4aha58
-
MD5
309a885cde51c3a333adaae4437037e0
-
SHA1
38aeca10e4da38e35e9a936eb904fc7fa642fcf6
-
SHA256
9f42aa4876bca0ad7c0abf3413b5b4128a92e6a5d5328ea65a38ef57eb10bcf6
-
SHA512
207dbc24f201a44ec92e45bd38d4369911e7641346a5fbd206b0e952fc5fc1b37b256851243858b73a71a4e4eb9ff6b413373ec3338f416eb86441d01a653e6e
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCApCPRKCjy:Lz071uv4BPMk+QqPc
Behavioral task
behavioral1
Sample
309a885cde51c3a333adaae4437037e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
309a885cde51c3a333adaae4437037e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
309a885cde51c3a333adaae4437037e0_NeikiAnalytics
-
Size
1.1MB
-
MD5
309a885cde51c3a333adaae4437037e0
-
SHA1
38aeca10e4da38e35e9a936eb904fc7fa642fcf6
-
SHA256
9f42aa4876bca0ad7c0abf3413b5b4128a92e6a5d5328ea65a38ef57eb10bcf6
-
SHA512
207dbc24f201a44ec92e45bd38d4369911e7641346a5fbd206b0e952fc5fc1b37b256851243858b73a71a4e4eb9ff6b413373ec3338f416eb86441d01a653e6e
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCApCPRKCjy:Lz071uv4BPMk+QqPc
Score10/10-
XMRig Miner payload
-
Blocklisted process makes network request
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-