General
-
Target
1d497f3b11e46c0aefa710db28433fc0_NeikiAnalytics.exe
-
Size
241KB
-
Sample
240527-d946gseh9x
-
MD5
1d497f3b11e46c0aefa710db28433fc0
-
SHA1
3d2f7ab0e0eb623d7560fd20f5457961cbdbc42e
-
SHA256
d283e5ff7df8693ac522865b0c89662cbdba58fbd83e6404af2736656285c1e4
-
SHA512
a224bcd0406e0d4d4ba4680dbaea86fefbd43c57aa79701fe7397d88627f764f421c894a81397d5dcec8436aa17f596c96d80a649e4187e7540de98e23c66f61
-
SSDEEP
3072:Re1H2+C3A2QSr4Adea6S5y7oBlD5uURUI:A1HC3P4K5moBy3
Static task
static1
Behavioral task
behavioral1
Sample
1d497f3b11e46c0aefa710db28433fc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d497f3b11e46c0aefa710db28433fc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
1d497f3b11e46c0aefa710db28433fc0_NeikiAnalytics.exe
-
Size
241KB
-
MD5
1d497f3b11e46c0aefa710db28433fc0
-
SHA1
3d2f7ab0e0eb623d7560fd20f5457961cbdbc42e
-
SHA256
d283e5ff7df8693ac522865b0c89662cbdba58fbd83e6404af2736656285c1e4
-
SHA512
a224bcd0406e0d4d4ba4680dbaea86fefbd43c57aa79701fe7397d88627f764f421c894a81397d5dcec8436aa17f596c96d80a649e4187e7540de98e23c66f61
-
SSDEEP
3072:Re1H2+C3A2QSr4Adea6S5y7oBlD5uURUI:A1HC3P4K5moBy3
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2