General
-
Target
fcacb16567d65cda66d34ae96954eeb0_NeikiAnalytics.exe
-
Size
231KB
-
Sample
240525-q52k1sef8w
-
MD5
fcacb16567d65cda66d34ae96954eeb0
-
SHA1
c0dc26ea34fd2594f2690fc130c9a346b7257c06
-
SHA256
3a2eb9dfbef8eb388c5dad9ab78fef11dff0f0d627afb092d1b404c573dbdbb9
-
SHA512
a57ea9f7e5e22e9aad76436bbc91f5f1c1dc36aa94f8e4c84a536134daee39220e729e99095a462ce02d176f3b490c9701812c1c2bd1ca4c512f6d53c44d95f0
-
SSDEEP
6144:otzuglqghAbtpABzd+BMwJXqNvQ1kCBaCCJx9b25c:otzuglqghAbtpABzdq0gBfO
Behavioral task
behavioral1
Sample
fcacb16567d65cda66d34ae96954eeb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
fcacb16567d65cda66d34ae96954eeb0_NeikiAnalytics.exe
-
Size
231KB
-
MD5
fcacb16567d65cda66d34ae96954eeb0
-
SHA1
c0dc26ea34fd2594f2690fc130c9a346b7257c06
-
SHA256
3a2eb9dfbef8eb388c5dad9ab78fef11dff0f0d627afb092d1b404c573dbdbb9
-
SHA512
a57ea9f7e5e22e9aad76436bbc91f5f1c1dc36aa94f8e4c84a536134daee39220e729e99095a462ce02d176f3b490c9701812c1c2bd1ca4c512f6d53c44d95f0
-
SSDEEP
6144:otzuglqghAbtpABzd+BMwJXqNvQ1kCBaCCJx9b25c:otzuglqghAbtpABzdq0gBfO
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-