General
-
Target
20d9fa474fa2628a6abe5485d35ee7e0_NeikiAnalytics.exe
-
Size
597KB
-
Sample
240606-2d67zach2y
-
MD5
20d9fa474fa2628a6abe5485d35ee7e0
-
SHA1
a28af73bcfd4ebe2fe29242c07fec15e0578ec8a
-
SHA256
0000599cbc6e5b0633c5a6261c79e4d3d81005c77845c6b0679d854884a8e02f
-
SHA512
2301c6c44797d16067e2b8e0336e897929de071246d87d54f88ec9c4f217bcb2f1388837fb9f3f5a915a0f0b3651dd93b3ed13c6ce85e7dd33dd957ade571387
-
SSDEEP
12288:mm0+bjvfBp6pOcQmqtPxGKw3genar9XW6Y:Awn6UcQmEPx2wem9XWf
Static task
static1
Behavioral task
behavioral1
Sample
20d9fa474fa2628a6abe5485d35ee7e0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20d9fa474fa2628a6abe5485d35ee7e0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\_README_.hta
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\_README_.hta
Targets
-
-
Target
20d9fa474fa2628a6abe5485d35ee7e0_NeikiAnalytics.exe
-
Size
597KB
-
MD5
20d9fa474fa2628a6abe5485d35ee7e0
-
SHA1
a28af73bcfd4ebe2fe29242c07fec15e0578ec8a
-
SHA256
0000599cbc6e5b0633c5a6261c79e4d3d81005c77845c6b0679d854884a8e02f
-
SHA512
2301c6c44797d16067e2b8e0336e897929de071246d87d54f88ec9c4f217bcb2f1388837fb9f3f5a915a0f0b3651dd93b3ed13c6ce85e7dd33dd957ade571387
-
SSDEEP
12288:mm0+bjvfBp6pOcQmqtPxGKw3genar9XW6Y:Awn6UcQmEPx2wem9XWf
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (1093) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Sets desktop wallpaper using registry
-