General

  • Target

    74bbef645fd4dde36db12ebb816df540_NeikiAnalytics.exe

  • Size

    49KB

  • Sample

    240523-cktg1sab72

  • MD5

    74bbef645fd4dde36db12ebb816df540

  • SHA1

    e7282ff83123d885c13c170d7153df99d505ffd5

  • SHA256

    2efda8c8fb4768eda56b314e52832aee1763bb4c65816ec399779b9898b5c15d

  • SHA512

    bee3a5b1d6e2d0d6c8c36e8059f053292d590499057eff7e41930716dee2110ba23dba8dff9a500c0accaad7a653dd295f7a75152bb6690d23be43b8acfd4c71

  • SSDEEP

    768:mzQYScGrIubHuYtvdxwYHw5FAe2Qfncwx9vMdJTeTXpnHTkGrbHdrzxDvDInYn:gQTIubHy5wQfJAejpzkGdxDLIYn

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      74bbef645fd4dde36db12ebb816df540_NeikiAnalytics.exe

    • Size

      49KB

    • MD5

      74bbef645fd4dde36db12ebb816df540

    • SHA1

      e7282ff83123d885c13c170d7153df99d505ffd5

    • SHA256

      2efda8c8fb4768eda56b314e52832aee1763bb4c65816ec399779b9898b5c15d

    • SHA512

      bee3a5b1d6e2d0d6c8c36e8059f053292d590499057eff7e41930716dee2110ba23dba8dff9a500c0accaad7a653dd295f7a75152bb6690d23be43b8acfd4c71

    • SSDEEP

      768:mzQYScGrIubHuYtvdxwYHw5FAe2Qfncwx9vMdJTeTXpnHTkGrbHdrzxDvDInYn:gQTIubHy5wQfJAejpzkGdxDLIYn

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks