General
-
Target
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe
-
Size
381KB
-
Sample
240519-twhy4afd3v
-
MD5
f1885cb2016cd8ba7abbb68967dd1ad0
-
SHA1
ce6d86cdb442c318b22fb4ca4d2df681b63e95b6
-
SHA256
5736438a3bef53bde9a5bd6d7a7891164c2f89e5e516f979cacfb8c296bc9ea2
-
SHA512
b8c2e3fb824ee045c873221053fe0999349543c23a91211538e2911968bbecc2d1c415cdc7ab4ed663a8e030772ed516055a644b04adfa9665172ad9f5101cdb
-
SSDEEP
6144:kcm4FmowdHoSphraHcpOaKHpSwp9OD0IbswYT/:y4wFHoS3eFaKHpNKbbswe/
Behavioral task
behavioral1
Sample
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe
-
Size
381KB
-
MD5
f1885cb2016cd8ba7abbb68967dd1ad0
-
SHA1
ce6d86cdb442c318b22fb4ca4d2df681b63e95b6
-
SHA256
5736438a3bef53bde9a5bd6d7a7891164c2f89e5e516f979cacfb8c296bc9ea2
-
SHA512
b8c2e3fb824ee045c873221053fe0999349543c23a91211538e2911968bbecc2d1c415cdc7ab4ed663a8e030772ed516055a644b04adfa9665172ad9f5101cdb
-
SSDEEP
6144:kcm4FmowdHoSphraHcpOaKHpSwp9OD0IbswYT/:y4wFHoS3eFaKHpNKbbswe/
-
Detect Blackmoon payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-