General
-
Target
836f9e6c51fbf3fd503f192805a26f30_NeikiAnalytics.exe
-
Size
5.3MB
-
Sample
240522-yzvvaaeh4s
-
MD5
836f9e6c51fbf3fd503f192805a26f30
-
SHA1
d9a4b96c46237183b6914ed6ca77b87b8512cbf4
-
SHA256
1ed1f72170a4ddd93171be47d30bf47db08437cf76af64f2692a4e63cbab8ab1
-
SHA512
c3c074d2afb9aab572075c05014813da336758107e73b1cd988b3d62447f81a2928d113f1a1c5b236e405d27a0b3b1821a2601cea0c190ed226a22bd382f6a71
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
Static task
static1
Behavioral task
behavioral1
Sample
836f9e6c51fbf3fd503f192805a26f30_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
836f9e6c51fbf3fd503f192805a26f30_NeikiAnalytics.exe
-
Size
5.3MB
-
MD5
836f9e6c51fbf3fd503f192805a26f30
-
SHA1
d9a4b96c46237183b6914ed6ca77b87b8512cbf4
-
SHA256
1ed1f72170a4ddd93171be47d30bf47db08437cf76af64f2692a4e63cbab8ab1
-
SHA512
c3c074d2afb9aab572075c05014813da336758107e73b1cd988b3d62447f81a2928d113f1a1c5b236e405d27a0b3b1821a2601cea0c190ed226a22bd382f6a71
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-