General

  • Target

    3552f3e9142355e9a349d8daa2778720_NeikiAnalytics

  • Size

    58KB

  • Sample

    240512-vx752sga9z

  • MD5

    3552f3e9142355e9a349d8daa2778720

  • SHA1

    df2af5da81bebb84077a4ae4c0bf097da59de5aa

  • SHA256

    e69a2eca75cea69809d06093353f975de0611a796a1ff04a757ba6e211e40cb0

  • SHA512

    44c0e2fb7f67661af16ab73c8d5388626157c9cdf930e4f559198569b6600167d1b07fb86093114cb042e3b4a210b6926e0ae436f6b5b1e2560cc78bf299d327

  • SSDEEP

    768:9qSqC8+N5ozQQRncwxWmNXMX3cX8wtgtzpAXpX8/X/7CUrfbtSqklPU:9rqfzQQRamN8835mv7CUroqklPU

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      3552f3e9142355e9a349d8daa2778720_NeikiAnalytics

    • Size

      58KB

    • MD5

      3552f3e9142355e9a349d8daa2778720

    • SHA1

      df2af5da81bebb84077a4ae4c0bf097da59de5aa

    • SHA256

      e69a2eca75cea69809d06093353f975de0611a796a1ff04a757ba6e211e40cb0

    • SHA512

      44c0e2fb7f67661af16ab73c8d5388626157c9cdf930e4f559198569b6600167d1b07fb86093114cb042e3b4a210b6926e0ae436f6b5b1e2560cc78bf299d327

    • SSDEEP

      768:9qSqC8+N5ozQQRncwxWmNXMX3cX8wtgtzpAXpX8/X/7CUrfbtSqklPU:9rqfzQQRamN8835mv7CUroqklPU

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks