General
-
Target
aab6654a629fb747b2da107d94801430_NeikiAnalytics.exe
-
Size
163KB
-
Sample
240604-xl3sasgh57
-
MD5
aab6654a629fb747b2da107d94801430
-
SHA1
8980c8a4d38aa0e79f542bcc90b8af4ed809ab19
-
SHA256
6160da02de6273eac37119f26a7c8b1cbe1a56aa6fc71777f898729406c3f2d7
-
SHA512
ce1d4170bbb5103fdfc0a0fdbb8f4f9b9836877269c304a4d54858fe53495665d8c7a0d01bbbf1eed09e4fbc2de07e3b92843c8da139cdd4ec3128f42d8ac003
-
SSDEEP
3072:w+QhVTzgTAX1TILQdH+GltOrWKDBr+yJb:OVbILQoGLOf
Static task
static1
Behavioral task
behavioral1
Sample
aab6654a629fb747b2da107d94801430_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
aab6654a629fb747b2da107d94801430_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
gozi
Targets
-
-
Target
aab6654a629fb747b2da107d94801430_NeikiAnalytics.exe
-
Size
163KB
-
MD5
aab6654a629fb747b2da107d94801430
-
SHA1
8980c8a4d38aa0e79f542bcc90b8af4ed809ab19
-
SHA256
6160da02de6273eac37119f26a7c8b1cbe1a56aa6fc71777f898729406c3f2d7
-
SHA512
ce1d4170bbb5103fdfc0a0fdbb8f4f9b9836877269c304a4d54858fe53495665d8c7a0d01bbbf1eed09e4fbc2de07e3b92843c8da139cdd4ec3128f42d8ac003
-
SSDEEP
3072:w+QhVTzgTAX1TILQdH+GltOrWKDBr+yJb:OVbILQoGLOf
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-