General
-
Target
5a2cec4e1c9014b11eaef47d7e333d74b24b3809dea8f4742332fdec54654e32_NeikiAnalytics
-
Size
1.5MB
-
Sample
240521-q8a78sgc76
-
MD5
b06621cf3c68e539d210a08eb7e42706
-
SHA1
43edb75c077a591bb04025d0d09a0bad858077e7
-
SHA256
5a2cec4e1c9014b11eaef47d7e333d74b24b3809dea8f4742332fdec54654e32
-
SHA512
da63de92955cbc10d880542d83bd1b14226c0032e8cb081658875aad791aa2f419726eb52ea9b1c45f8df16bd5fa3972e560552bd81ef092b4f0feb0754e1be3
-
SSDEEP
24576:iKFq8zJO+ZEgpqI41vsQTjFqp200bCklu4DbMAOA3OO6Jg0BydVI7ZWc:ij8tO+YIQUyjkpw9RbMP7gtVI7/
Behavioral task
behavioral1
Sample
5a2cec4e1c9014b11eaef47d7e333d74b24b3809dea8f4742332fdec54654e32_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
5a2cec4e1c9014b11eaef47d7e333d74b24b3809dea8f4742332fdec54654e32_NeikiAnalytics
-
Size
1.5MB
-
MD5
b06621cf3c68e539d210a08eb7e42706
-
SHA1
43edb75c077a591bb04025d0d09a0bad858077e7
-
SHA256
5a2cec4e1c9014b11eaef47d7e333d74b24b3809dea8f4742332fdec54654e32
-
SHA512
da63de92955cbc10d880542d83bd1b14226c0032e8cb081658875aad791aa2f419726eb52ea9b1c45f8df16bd5fa3972e560552bd81ef092b4f0feb0754e1be3
-
SSDEEP
24576:iKFq8zJO+ZEgpqI41vsQTjFqp200bCklu4DbMAOA3OO6Jg0BydVI7ZWc:ij8tO+YIQUyjkpw9RbMP7gtVI7/
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-