General
-
Target
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
-
Size
42KB
-
Sample
240523-avx7vaeh2s
-
MD5
62b1d7673220b7f3c50184cd032af7e0
-
SHA1
e6e7c81611e0fbe07d5464e8d252afc8112169e4
-
SHA256
b4d1ad3c13c696680ce4eb68614fe21079b040d70762b21f0b2d05fa220763fd
-
SHA512
5ae501e19ce8eb20c13e8aaaf3285206b13553680a01d8af4231629de296d70c518b0f2379563e87a594cd14f6f7f92725c48c05fc5d8036c2be6a831d0e5f62
-
SSDEEP
768:xIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77DPQ1TTGfGYha:xI0OGrOy6NvSpMZrQ1Jt
Static task
static1
Behavioral task
behavioral1
Sample
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
-
Size
42KB
-
MD5
62b1d7673220b7f3c50184cd032af7e0
-
SHA1
e6e7c81611e0fbe07d5464e8d252afc8112169e4
-
SHA256
b4d1ad3c13c696680ce4eb68614fe21079b040d70762b21f0b2d05fa220763fd
-
SHA512
5ae501e19ce8eb20c13e8aaaf3285206b13553680a01d8af4231629de296d70c518b0f2379563e87a594cd14f6f7f92725c48c05fc5d8036c2be6a831d0e5f62
-
SSDEEP
768:xIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77DPQ1TTGfGYha:xI0OGrOy6NvSpMZrQ1Jt
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-