General

  • Target

    43f51244e9354228cc97beac972292a0_NeikiAnalytics

  • Size

    158KB

  • Sample

    240515-1559baef9x

  • MD5

    43f51244e9354228cc97beac972292a0

  • SHA1

    e0b2bb6e004b17a93bad820276193c5f873e3062

  • SHA256

    f6eaa399be182c3d3bc1fcf84b43cda8cd915c79896115afa887cbf4bc5aee56

  • SHA512

    d680c3670d6c752b9e9a7e8ea6bb6846dd8621a7197a3eaccf786cea7f11fc92d77643e196e04536515bda9ae4103a46e92e0008839b2f3938d790c4766deb1b

  • SSDEEP

    3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdB:KQSo1EZGtKgZGtK/CAIuZAIuR

Score
9/10

Malware Config

Targets

    • Target

      43f51244e9354228cc97beac972292a0_NeikiAnalytics

    • Size

      158KB

    • MD5

      43f51244e9354228cc97beac972292a0

    • SHA1

      e0b2bb6e004b17a93bad820276193c5f873e3062

    • SHA256

      f6eaa399be182c3d3bc1fcf84b43cda8cd915c79896115afa887cbf4bc5aee56

    • SHA512

      d680c3670d6c752b9e9a7e8ea6bb6846dd8621a7197a3eaccf786cea7f11fc92d77643e196e04536515bda9ae4103a46e92e0008839b2f3938d790c4766deb1b

    • SSDEEP

      3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdB:KQSo1EZGtKgZGtK/CAIuZAIuR

    Score
    9/10
    • Renames multiple (3220) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks