General

  • Target

    76df9109b1c19835bd17df9696329220_NeikiAnalytics.exe

  • Size

    145KB

  • Sample

    240602-2eb38aad84

  • MD5

    76df9109b1c19835bd17df9696329220

  • SHA1

    42544c707cbfbb4c8a7cec19149e37408cf58c31

  • SHA256

    edb99c3f561d3db84ef735783189e2eef9863b13859f28b47ded44bd665e4cf8

  • SHA512

    1526b84e922b0750f4ee6db5d2818ef33dc732a572df496da9cd2238edd2d1aea2530c53c1f99a2adea4dee4410ac3e21e8083ce600aaff8015eea11cf56ada9

  • SSDEEP

    768:j/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLE6:jRsvcdcQjosnvnZ6LQ1EE6

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Targets

    • Target

      76df9109b1c19835bd17df9696329220_NeikiAnalytics.exe

    • Size

      145KB

    • MD5

      76df9109b1c19835bd17df9696329220

    • SHA1

      42544c707cbfbb4c8a7cec19149e37408cf58c31

    • SHA256

      edb99c3f561d3db84ef735783189e2eef9863b13859f28b47ded44bd665e4cf8

    • SHA512

      1526b84e922b0750f4ee6db5d2818ef33dc732a572df496da9cd2238edd2d1aea2530c53c1f99a2adea4dee4410ac3e21e8083ce600aaff8015eea11cf56ada9

    • SSDEEP

      768:j/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLE6:jRsvcdcQjosnvnZ6LQ1EE6

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks