General

  • Target

    3b7be46d9681ae663cdabfbff906fbb0_NeikiAnalytics

  • Size

    48KB

  • Sample

    240514-acmcmaba7x

  • MD5

    3b7be46d9681ae663cdabfbff906fbb0

  • SHA1

    58cf633e65183f6e10c6e7a64b7da2b4e68afe14

  • SHA256

    10e9e77c9c6e1f03d6b99c3f8fbf7c303b38bcbe0135190235c9d21bc447389d

  • SHA512

    c2222e2b2761a00c0feb96d1bc253925f1bbee7cc92decdccf67715510c819e0c22409c69b4cef8f73fe9287e8f64f1d5ac27747ccdf3595b08596485fac5f3b

  • SSDEEP

    1536:ZBCrmih8u2+3ATdPHCjpkvxtbf8QE9gGUm:ZgiihtfQOL7xZ

Score
7/10
upx

Malware Config

Targets

    • Target

      3b7be46d9681ae663cdabfbff906fbb0_NeikiAnalytics

    • Size

      48KB

    • MD5

      3b7be46d9681ae663cdabfbff906fbb0

    • SHA1

      58cf633e65183f6e10c6e7a64b7da2b4e68afe14

    • SHA256

      10e9e77c9c6e1f03d6b99c3f8fbf7c303b38bcbe0135190235c9d21bc447389d

    • SHA512

      c2222e2b2761a00c0feb96d1bc253925f1bbee7cc92decdccf67715510c819e0c22409c69b4cef8f73fe9287e8f64f1d5ac27747ccdf3595b08596485fac5f3b

    • SSDEEP

      1536:ZBCrmih8u2+3ATdPHCjpkvxtbf8QE9gGUm:ZgiihtfQOL7xZ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks