General
-
Target
06fcda0a0e923ec22a8cf0546795f620_NeikiAnalytics
-
Size
163KB
-
Sample
240515-vkjxpaba52
-
MD5
06fcda0a0e923ec22a8cf0546795f620
-
SHA1
87f256868f3652586d1d9f4700b346ae01605d43
-
SHA256
f297ac15619b88a1895cce2ff6b834dded0ab2085e2fe42adb02d1cb67c66dd4
-
SHA512
2655627433b398706a03cf5c36a2dfe66d6b5b18680b1a72980af6b7b07aa7818f05a9a3fa4bbf07aaa6e2978471b11cfe08991776bebbb1138b7a507833b4e1
-
SSDEEP
3072:mUPZX0nh1WombW58X3H5PltOrWKDBr+yJb:mUPZXkh1WtW58nZPLOf
Static task
static1
Behavioral task
behavioral1
Sample
06fcda0a0e923ec22a8cf0546795f620_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
06fcda0a0e923ec22a8cf0546795f620_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
gozi
Targets
-
-
Target
06fcda0a0e923ec22a8cf0546795f620_NeikiAnalytics
-
Size
163KB
-
MD5
06fcda0a0e923ec22a8cf0546795f620
-
SHA1
87f256868f3652586d1d9f4700b346ae01605d43
-
SHA256
f297ac15619b88a1895cce2ff6b834dded0ab2085e2fe42adb02d1cb67c66dd4
-
SHA512
2655627433b398706a03cf5c36a2dfe66d6b5b18680b1a72980af6b7b07aa7818f05a9a3fa4bbf07aaa6e2978471b11cfe08991776bebbb1138b7a507833b4e1
-
SSDEEP
3072:mUPZX0nh1WombW58X3H5PltOrWKDBr+yJb:mUPZXkh1WtW58nZPLOf
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-