General
-
Target
31889820ee1563f02c415ba07e2220b0_NeikiAnalytics.exe
-
Size
619KB
-
Sample
240523-t3tdeahc2s
-
MD5
31889820ee1563f02c415ba07e2220b0
-
SHA1
5f49d38935524040e6222897077c6393e1d14a43
-
SHA256
e05c517fb4a915b142200ca5dfe2e69fd579a2ffbfbcafc2b4d478163d407b09
-
SHA512
1340bcd80292531773da8bd766ab579c2ee96c6df0258775a8e61dd252a7c823afd26e56615c0835cb1073f7f21b4319967a456c076bd004b84fa2bdcca50810
-
SSDEEP
12288:0IqWET/mr9K+22BEEzFatnPvEOwWkIai6YpgnNMuskRBqdQV3i:4Wtb3BEV8OwWklPYyNMy0QZ
Static task
static1
Behavioral task
behavioral1
Sample
31889820ee1563f02c415ba07e2220b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/3b1tenbkyj
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
31889820ee1563f02c415ba07e2220b0_NeikiAnalytics.exe
-
Size
619KB
-
MD5
31889820ee1563f02c415ba07e2220b0
-
SHA1
5f49d38935524040e6222897077c6393e1d14a43
-
SHA256
e05c517fb4a915b142200ca5dfe2e69fd579a2ffbfbcafc2b4d478163d407b09
-
SHA512
1340bcd80292531773da8bd766ab579c2ee96c6df0258775a8e61dd252a7c823afd26e56615c0835cb1073f7f21b4319967a456c076bd004b84fa2bdcca50810
-
SSDEEP
12288:0IqWET/mr9K+22BEEzFatnPvEOwWkIai6YpgnNMuskRBqdQV3i:4Wtb3BEV8OwWklPYyNMy0QZ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-