General

  • Target

    2269b25cfac36601d7883f1c3536ec20_NeikiAnalytics.exe

  • Size

    126KB

  • Sample

    240611-bprcsaygpn

  • MD5

    2269b25cfac36601d7883f1c3536ec20

  • SHA1

    0b730ecc2a691f344e30e1e89a72e1897e28f50c

  • SHA256

    5be1459cb89a7426a91707678653b5a593bd53b5eed0a6f4817668971af3847d

  • SHA512

    80f169e6ef35a7f0c5407c54fb9521a3cfb8320960232a38334ddc191b00d7eac0d22e7e47749ca393b9be532524ca8a479fb476d28e495a9ed876d226849fdd

  • SSDEEP

    3072:4EboFVlGAvwsgbpvYfMTc72L10fPsout6S:HBzsgbpvnTcyOPsoS6S

Score
7/10
upx

Malware Config

Targets

    • Target

      2269b25cfac36601d7883f1c3536ec20_NeikiAnalytics.exe

    • Size

      126KB

    • MD5

      2269b25cfac36601d7883f1c3536ec20

    • SHA1

      0b730ecc2a691f344e30e1e89a72e1897e28f50c

    • SHA256

      5be1459cb89a7426a91707678653b5a593bd53b5eed0a6f4817668971af3847d

    • SHA512

      80f169e6ef35a7f0c5407c54fb9521a3cfb8320960232a38334ddc191b00d7eac0d22e7e47749ca393b9be532524ca8a479fb476d28e495a9ed876d226849fdd

    • SSDEEP

      3072:4EboFVlGAvwsgbpvYfMTc72L10fPsout6S:HBzsgbpvnTcyOPsoS6S

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks