General

  • Target

    047b6541185443cc6a627648f7453330_NeikiAnalytics.exe

  • Size

    90KB

  • Sample

    240528-zmzs5sbg3z

  • MD5

    047b6541185443cc6a627648f7453330

  • SHA1

    7d0a51ee6f4b8466e8991fc88557416e7abee0f3

  • SHA256

    e6f2fbf8685066aec229883ef72cba76f3a271f9006729e2a62fe400a9fe8d17

  • SHA512

    a6095048f9c86f606101596c39d1168cb755c19865f312cf6bf76ce0703d502feab028bb9b66796228a8e95c84dee638395d73f0a93379e0ce9f69d49c766876

  • SSDEEP

    1536:UN5O9mncLg4eQHPktA+tdmQXQKNZQMvYf6rUhU5TiB5Z6CSIc:UC4A+2QXQKNZzvHU0J

Score
7/10

Malware Config

Targets

    • Target

      047b6541185443cc6a627648f7453330_NeikiAnalytics.exe

    • Size

      90KB

    • MD5

      047b6541185443cc6a627648f7453330

    • SHA1

      7d0a51ee6f4b8466e8991fc88557416e7abee0f3

    • SHA256

      e6f2fbf8685066aec229883ef72cba76f3a271f9006729e2a62fe400a9fe8d17

    • SHA512

      a6095048f9c86f606101596c39d1168cb755c19865f312cf6bf76ce0703d502feab028bb9b66796228a8e95c84dee638395d73f0a93379e0ce9f69d49c766876

    • SSDEEP

      1536:UN5O9mncLg4eQHPktA+tdmQXQKNZQMvYf6rUhU5TiB5Z6CSIc:UC4A+2QXQKNZzvHU0J

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks