General

  • Target

    4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe

  • Size

    68KB

  • Sample

    240529-jnld5sfe8t

  • MD5

    4b66e88f5cd6c57bae26b5909962a6f0

  • SHA1

    b321839641c0a252e1a833b855288cf75cf57088

  • SHA256

    c29e03f4ba80db9136e5f43e3ef65ddeee2b76857e1d4676836b52a5db2a9960

  • SHA512

    d718afb49141237c6274870afe639ae380c372c36dfa83de5e28ac5c184ed63777744555150ce658e336b9942dd7763455c51445b96b0449ad4735d6c5f9c510

  • SSDEEP

    1536:gQTIubHy5wQmJAejpzkGdxDLw3qMnd1YzHgAB71mI:R4wJZpzNdxDL25ELBmI

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      4b66e88f5cd6c57bae26b5909962a6f0_NeikiAnalytics.exe

    • Size

      68KB

    • MD5

      4b66e88f5cd6c57bae26b5909962a6f0

    • SHA1

      b321839641c0a252e1a833b855288cf75cf57088

    • SHA256

      c29e03f4ba80db9136e5f43e3ef65ddeee2b76857e1d4676836b52a5db2a9960

    • SHA512

      d718afb49141237c6274870afe639ae380c372c36dfa83de5e28ac5c184ed63777744555150ce658e336b9942dd7763455c51445b96b0449ad4735d6c5f9c510

    • SSDEEP

      1536:gQTIubHy5wQmJAejpzkGdxDLw3qMnd1YzHgAB71mI:R4wJZpzNdxDL25ELBmI

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks