General
-
Target
805682d0828e3c4829cce6d591310d90_NeikiAnalytics
-
Size
5.2MB
-
Sample
240512-jtmjdsfe5s
-
MD5
805682d0828e3c4829cce6d591310d90
-
SHA1
6240d51bf4f25250cc40d97b3cb82f0cee22fd3e
-
SHA256
4ce7ac90407bb5d3f6733cbc85fd706aaa39da60a4135355767351d3d865e8a2
-
SHA512
76fe9ccc9b6dd6dd53cbe2561a31f09b32f5f1d7c6997e5c08d0851356756ce0d07f40cc2f0cb963d3443a4c9b7eff09a192dbb019f08d4795fe6e8d046e2d8f
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
Static task
static1
Behavioral task
behavioral1
Sample
805682d0828e3c4829cce6d591310d90_NeikiAnalytics.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
805682d0828e3c4829cce6d591310d90_NeikiAnalytics
-
Size
5.2MB
-
MD5
805682d0828e3c4829cce6d591310d90
-
SHA1
6240d51bf4f25250cc40d97b3cb82f0cee22fd3e
-
SHA256
4ce7ac90407bb5d3f6733cbc85fd706aaa39da60a4135355767351d3d865e8a2
-
SHA512
76fe9ccc9b6dd6dd53cbe2561a31f09b32f5f1d7c6997e5c08d0851356756ce0d07f40cc2f0cb963d3443a4c9b7eff09a192dbb019f08d4795fe6e8d046e2d8f
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-