General
-
Target
2d66c6ef2c87e83854892280dd275cc0_NeikiAnalytics
-
Size
127KB
-
Sample
240513-2mda9ahc44
-
MD5
2d66c6ef2c87e83854892280dd275cc0
-
SHA1
fc1b0b3532f47c2e6188fc9368976a7dd0d469e9
-
SHA256
6264f9bb8e379726ba6c0a56b69fd414826d51a0a0b31dec67fc44729a30e895
-
SHA512
d0d708c39f6c5be1f4afc9ce17118a822fd7debada5463b9d2605cf8a3cdbd0e968f4d75c8b1e4eb90bd3482c08648b72c66a89e603a3804a005b61e32909fa1
-
SSDEEP
3072:bOjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:bIH9OKofHfHTXQLzgvnzHPowYbvrjD/O
Static task
static1
Behavioral task
behavioral1
Sample
2d66c6ef2c87e83854892280dd275cc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d66c6ef2c87e83854892280dd275cc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2d66c6ef2c87e83854892280dd275cc0_NeikiAnalytics
-
Size
127KB
-
MD5
2d66c6ef2c87e83854892280dd275cc0
-
SHA1
fc1b0b3532f47c2e6188fc9368976a7dd0d469e9
-
SHA256
6264f9bb8e379726ba6c0a56b69fd414826d51a0a0b31dec67fc44729a30e895
-
SHA512
d0d708c39f6c5be1f4afc9ce17118a822fd7debada5463b9d2605cf8a3cdbd0e968f4d75c8b1e4eb90bd3482c08648b72c66a89e603a3804a005b61e32909fa1
-
SSDEEP
3072:bOjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:bIH9OKofHfHTXQLzgvnzHPowYbvrjD/O
Score7/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-