General
-
Target
4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe
-
Size
68KB
-
Sample
240529-jnld5sfe8t
-
MD5
4b66e88f5cd6c57bae26b5909962a6f0
-
SHA1
b321839641c0a252e1a833b855288cf75cf57088
-
SHA256
c29e03f4ba80db9136e5f43e3ef65ddeee2b76857e1d4676836b52a5db2a9960
-
SHA512
d718afb49141237c6274870afe639ae380c372c36dfa83de5e28ac5c184ed63777744555150ce658e336b9942dd7763455c51445b96b0449ad4735d6c5f9c510
-
SSDEEP
1536:gQTIubHy5wQmJAejpzkGdxDLw3qMnd1YzHgAB71mI:R4wJZpzNdxDL25ELBmI
Static task
static1
Behavioral task
behavioral1
Sample
4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Targets
-
-
Target
4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe
-
Size
68KB
-
MD5
4b66e88f5cd6c57bae26b5909962a6f0
-
SHA1
b321839641c0a252e1a833b855288cf75cf57088
-
SHA256
c29e03f4ba80db9136e5f43e3ef65ddeee2b76857e1d4676836b52a5db2a9960
-
SHA512
d718afb49141237c6274870afe639ae380c372c36dfa83de5e28ac5c184ed63777744555150ce658e336b9942dd7763455c51445b96b0449ad4735d6c5f9c510
-
SSDEEP
1536:gQTIubHy5wQmJAejpzkGdxDLw3qMnd1YzHgAB71mI:R4wJZpzNdxDL25ELBmI
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-