General
-
Target
200520241609PO46338730Akyurek_NeikiAnalytics
-
Size
424KB
-
Sample
240521-jxz9nadg98
-
MD5
5c8a0cd7c1df368d3669e57e4e6eb7ff
-
SHA1
8396814190693dc7a85a46eeb3f4d594041c1432
-
SHA256
36079fc645456f2d6c195be5a0aaf0206116b57338796388c7db6454da0364f7
-
SHA512
f77ffb638fb305171fc5da4d524bf0091434f9cd8e3bec5ca961e96a5ca426af8d8b1cc2ec0e2701abe5ae091cf1358ea4d5326ec750c3ad5473a2a1ae9d6c36
-
SSDEEP
6144:f8Ozdm1XyaRDv6AxV+Ci7Ax3lJlg3jOwPJJw0bqEKo11EbpNVM:fY1X3hxQCinTfbqEKo11EbdM
Static task
static1
Behavioral task
behavioral1
Sample
200520241609PO46338730Akyurek_NeikiAnalytics.vbs
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
200520241609PO46338730Akyurek_NeikiAnalytics.vbs
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
https://altaskifer.sbs/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
200520241609PO46338730Akyurek_NeikiAnalytics
-
Size
424KB
-
MD5
5c8a0cd7c1df368d3669e57e4e6eb7ff
-
SHA1
8396814190693dc7a85a46eeb3f4d594041c1432
-
SHA256
36079fc645456f2d6c195be5a0aaf0206116b57338796388c7db6454da0364f7
-
SHA512
f77ffb638fb305171fc5da4d524bf0091434f9cd8e3bec5ca961e96a5ca426af8d8b1cc2ec0e2701abe5ae091cf1358ea4d5326ec750c3ad5473a2a1ae9d6c36
-
SSDEEP
6144:f8Ozdm1XyaRDv6AxV+Ci7Ax3lJlg3jOwPJJw0bqEKo11EbpNVM:fY1X3hxQCinTfbqEKo11EbdM
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-