General
-
Target
35960d9c8978b20e715367987017fa80_NeikiAnalytics.exe
-
Size
1.6MB
-
Sample
240522-zdhs9sff4z
-
MD5
35960d9c8978b20e715367987017fa80
-
SHA1
fd49878d3aac2f6da59fd8e98a3d942c7cece3b2
-
SHA256
61afe9dcf326f010c39c1c3ecb0063abd022cefb7cc29b6a9777d83b0ef27a79
-
SHA512
4611ff9896a8a7c333f4fb5249c5a0c328fc27fb31164d46108483ab6e43266380998ae0f2b3d10eb730da6b396918a3368be1450c254beed870bd1d69b77a99
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PxtG8PEpklLvYl8UywjwCIlaa+F551HfyeoxwOUzPlnH:Lz071uv4BPjGhql0lQGQK5BKrwH
Behavioral task
behavioral1
Sample
35960d9c8978b20e715367987017fa80_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
35960d9c8978b20e715367987017fa80_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
35960d9c8978b20e715367987017fa80
-
SHA1
fd49878d3aac2f6da59fd8e98a3d942c7cece3b2
-
SHA256
61afe9dcf326f010c39c1c3ecb0063abd022cefb7cc29b6a9777d83b0ef27a79
-
SHA512
4611ff9896a8a7c333f4fb5249c5a0c328fc27fb31164d46108483ab6e43266380998ae0f2b3d10eb730da6b396918a3368be1450c254beed870bd1d69b77a99
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PxtG8PEpklLvYl8UywjwCIlaa+F551HfyeoxwOUzPlnH:Lz071uv4BPjGhql0lQGQK5BKrwH
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-