General
-
Target
5d33c7fb1059afb110b42f18f6ef3b30_NeikiAnalytics.exe
-
Size
143KB
-
Sample
240530-a54glshb82
-
MD5
5d33c7fb1059afb110b42f18f6ef3b30
-
SHA1
b0cdf935351713eeffe5afb4245bc3a967bdad9c
-
SHA256
f9ff93f32e20b5a12c53d799eb260c3c032c6001c0875c8c6f8d53bce1ebe642
-
SHA512
86fad7d1d6b0fd984bc2bd38b76c98519ed517a089e4aa57c13e9797f7591d9564af372730140e7e1b505007dbc4fc6fe45cd11d2f2b7cbb11365854e18fb75a
-
SSDEEP
3072:IOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:IIs9OKofHfHTXQLzgvnzHPowYbvrjD/c
Static task
static1
Behavioral task
behavioral1
Sample
5d33c7fb1059afb110b42f18f6ef3b30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d33c7fb1059afb110b42f18f6ef3b30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
5d33c7fb1059afb110b42f18f6ef3b30_NeikiAnalytics.exe
-
Size
143KB
-
MD5
5d33c7fb1059afb110b42f18f6ef3b30
-
SHA1
b0cdf935351713eeffe5afb4245bc3a967bdad9c
-
SHA256
f9ff93f32e20b5a12c53d799eb260c3c032c6001c0875c8c6f8d53bce1ebe642
-
SHA512
86fad7d1d6b0fd984bc2bd38b76c98519ed517a089e4aa57c13e9797f7591d9564af372730140e7e1b505007dbc4fc6fe45cd11d2f2b7cbb11365854e18fb75a
-
SSDEEP
3072:IOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:IIs9OKofHfHTXQLzgvnzHPowYbvrjD/c
Score8/10-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-