General
-
Target
7fa7eba4e3ea268714e420c4c1a68290_NeikiAnalytics.exe
-
Size
5.3MB
-
Sample
240522-yz7tvaeh5t
-
MD5
7fa7eba4e3ea268714e420c4c1a68290
-
SHA1
18da68445d1b6116e3090d2254d4c61f570f7b96
-
SHA256
3ca145e7e51bbd623152e0e235a7cbc91bd37701dcc1f9c23942df064bd79d69
-
SHA512
e02af000d1391ef3521099176486fbc51eb85a5f2ea303db51b40b4d3598c5a868379710a4f23bfa404d73b1ada3880a06765148a08c73d23b3c395139ef72ba
-
SSDEEP
98304:RcmetZo1we5eNHA6Qtu1btqbyrvRdpveLhBRcIIIAEBczweizIPYj:9vwsKuoxqbyzRdpvuRcNIdBczjej
Static task
static1
Behavioral task
behavioral1
Sample
7fa7eba4e3ea268714e420c4c1a68290_NeikiAnalytics.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
7fa7eba4e3ea268714e420c4c1a68290_NeikiAnalytics.exe
-
Size
5.3MB
-
MD5
7fa7eba4e3ea268714e420c4c1a68290
-
SHA1
18da68445d1b6116e3090d2254d4c61f570f7b96
-
SHA256
3ca145e7e51bbd623152e0e235a7cbc91bd37701dcc1f9c23942df064bd79d69
-
SHA512
e02af000d1391ef3521099176486fbc51eb85a5f2ea303db51b40b4d3598c5a868379710a4f23bfa404d73b1ada3880a06765148a08c73d23b3c395139ef72ba
-
SSDEEP
98304:RcmetZo1we5eNHA6Qtu1btqbyrvRdpveLhBRcIIIAEBczweizIPYj:9vwsKuoxqbyzRdpvuRcNIdBczjej
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-