General

  • Target

    cb11a4d0db6796f25267934bdbcc3240_NeikiAnalytics.exe

  • Size

    125KB

  • Sample

    240531-xf2m2sab82

  • MD5

    cb11a4d0db6796f25267934bdbcc3240

  • SHA1

    d924e8d174c1c11da0c797e394f4974a72c094f8

  • SHA256

    74510ddc5d4998064b68e55ea2e3099466171612f110b3ff701dcb738954bfcd

  • SHA512

    2a31366f9e9342adbb538b70949dfb4b9e9d5916c125341a79eaa729f69608ccb1ed09fc9d868b82b2822b7ee91df7c9c84302dbaa3c5fdd6026b45c0e942b22

  • SSDEEP

    3072:2EboFVlGAvwsgbpvYfMTc72L10fPsout:FBzsgbpvnTcyOPsoS

Score
7/10
upx

Malware Config

Targets

    • Target

      cb11a4d0db6796f25267934bdbcc3240_NeikiAnalytics.exe

    • Size

      125KB

    • MD5

      cb11a4d0db6796f25267934bdbcc3240

    • SHA1

      d924e8d174c1c11da0c797e394f4974a72c094f8

    • SHA256

      74510ddc5d4998064b68e55ea2e3099466171612f110b3ff701dcb738954bfcd

    • SHA512

      2a31366f9e9342adbb538b70949dfb4b9e9d5916c125341a79eaa729f69608ccb1ed09fc9d868b82b2822b7ee91df7c9c84302dbaa3c5fdd6026b45c0e942b22

    • SSDEEP

      3072:2EboFVlGAvwsgbpvYfMTc72L10fPsout:FBzsgbpvnTcyOPsoS

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks