General
-
Target
067e2379a206f1a60933003ce436eb60_NeikiAnalytics.exe
-
Size
465KB
-
Sample
240521-x4rsrafh9s
-
MD5
067e2379a206f1a60933003ce436eb60
-
SHA1
0f505d81ab332a3701f12649e8622eea04cc0efe
-
SHA256
78ca060822cc0c3bbfd2eee4f1814c3f917c7914cfe3db5476929e051dd31390
-
SHA512
bdd6af45606dc6480a9fcf47eb64a99bb37b77a1e4e16e5f1477ee29e0ba64ed58fc1ec37d7ec9f883b145768ed00f3bff039dc6b54991e2a3a08e9b85904260
-
SSDEEP
6144:mBapC9DUIYmO5Kv5Q7X/l/rYvkW1VxxfnzrV9UAH0ctkPfc92F8CLpIh9jil:5pQD+mO5KWy/zrVbt4fcYd9U9jI
Static task
static1
Behavioral task
behavioral1
Sample
067e2379a206f1a60933003ce436eb60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
067e2379a206f1a60933003ce436eb60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
067e2379a206f1a60933003ce436eb60_NeikiAnalytics.exe
-
Size
465KB
-
MD5
067e2379a206f1a60933003ce436eb60
-
SHA1
0f505d81ab332a3701f12649e8622eea04cc0efe
-
SHA256
78ca060822cc0c3bbfd2eee4f1814c3f917c7914cfe3db5476929e051dd31390
-
SHA512
bdd6af45606dc6480a9fcf47eb64a99bb37b77a1e4e16e5f1477ee29e0ba64ed58fc1ec37d7ec9f883b145768ed00f3bff039dc6b54991e2a3a08e9b85904260
-
SSDEEP
6144:mBapC9DUIYmO5Kv5Q7X/l/rYvkW1VxxfnzrV9UAH0ctkPfc92F8CLpIh9jil:5pQD+mO5KWy/zrVbt4fcYd9U9jI
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-