General
-
Target
1PASisatrannyNeikiAnalytics
-
Size
23.6MB
-
Sample
240527-zn69lsah34
-
MD5
95615082a87c8b2be969ff4dc2ab73dd
-
SHA1
4bf1a82096989c88081c12b885f817f61cf01806
-
SHA256
4910f58c9a2ba49f9bead07d6fbaeb96f9f21a891e45f9b7a17a8aa38ef93c5f
-
SHA512
db6e9ea414d0900a438cf582a7706fae447fee50b80b49daa6c3e4b17b29a1244d9bc272086fec6eac51300c98d46508c251db0d99953b89b7dcda74edbbcabf
-
SSDEEP
393216:VW/PWTF9TDhrrqL0gZkoxQujmBZ41d+uz2Dr4RxV6oS0jbId1Twsm+lT/Fqyf0gR:VW/PWTFj+Rt181ERxX1jb8tT4v07
Behavioral task
behavioral1
Sample
1PASisatrannyNeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1PASisatrannyNeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
1PASisatrannyNeikiAnalytics
-
Size
23.6MB
-
MD5
95615082a87c8b2be969ff4dc2ab73dd
-
SHA1
4bf1a82096989c88081c12b885f817f61cf01806
-
SHA256
4910f58c9a2ba49f9bead07d6fbaeb96f9f21a891e45f9b7a17a8aa38ef93c5f
-
SHA512
db6e9ea414d0900a438cf582a7706fae447fee50b80b49daa6c3e4b17b29a1244d9bc272086fec6eac51300c98d46508c251db0d99953b89b7dcda74edbbcabf
-
SSDEEP
393216:VW/PWTF9TDhrrqL0gZkoxQujmBZ41d+uz2Dr4RxV6oS0jbId1Twsm+lT/Fqyf0gR:VW/PWTFj+Rt181ERxX1jb8tT4v07
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-