General

  • Target

    4b764a3e728d2254dd59b0131683eb40_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240522-2bzecabb5t

  • MD5

    4b764a3e728d2254dd59b0131683eb40

  • SHA1

    9db089b8dacdde0ea1a41edf7f54aaf64b2c05c7

  • SHA256

    a26a967faa834ad96ebef5d5315747a964cd1f856731c051cbaad7e79f2ab958

  • SHA512

    66d98ef8949db0744d2c8c4c8f8e29777cf90fcfac351ee7b252d60d2a565475b925d5cde653d1f249ffe2280f0b04e32cba9f61a0546f2292f66a65856b4627

  • SSDEEP

    768:EilivXrVKpVhKvtxwYHwVFoeAQgmucwUvfVAThsf4vvvWTDoNMe:XlqrVKprVuQg4fVAhNz

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      4b764a3e728d2254dd59b0131683eb40_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      4b764a3e728d2254dd59b0131683eb40

    • SHA1

      9db089b8dacdde0ea1a41edf7f54aaf64b2c05c7

    • SHA256

      a26a967faa834ad96ebef5d5315747a964cd1f856731c051cbaad7e79f2ab958

    • SHA512

      66d98ef8949db0744d2c8c4c8f8e29777cf90fcfac351ee7b252d60d2a565475b925d5cde653d1f249ffe2280f0b04e32cba9f61a0546f2292f66a65856b4627

    • SSDEEP

      768:EilivXrVKpVhKvtxwYHwVFoeAQgmucwUvfVAThsf4vvvWTDoNMe:XlqrVKprVuQg4fVAhNz

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks