General
-
Target
2af7826b803c1f5fba3e23b9b3de82f0_NeikiAnalytics.exe
-
Size
1.7MB
-
Sample
240611-g8smvaxemh
-
MD5
2af7826b803c1f5fba3e23b9b3de82f0
-
SHA1
9697a486c709cc061ed64ed376cab7d4af122986
-
SHA256
2cb0b6c1f841332c7ba8cadcf7f33765eb4bfc89f32286d3febdc0c0c99bf3fa
-
SHA512
119588fbfa918e620fb46103f55909453e1471dd4cb61ce59f1cfb49e8a1d8a837952f820500639207dcef2fb8ea7500e5a0d224f73c51fd9191cd88d3091a7e
-
SSDEEP
24576:Kr6ZB3xC3Bjut2ERKRJ+ZF3GwvNhi/hPvP6qVj9YuhmqKEJNDA+mFR9br:KmPx0uMEQJ+ZF2UNiFP3SjE8zR1
Static task
static1
Behavioral task
behavioral1
Sample
2af7826b803c1f5fba3e23b9b3de82f0_NeikiAnalytics.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
2af7826b803c1f5fba3e23b9b3de82f0_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
2af7826b803c1f5fba3e23b9b3de82f0
-
SHA1
9697a486c709cc061ed64ed376cab7d4af122986
-
SHA256
2cb0b6c1f841332c7ba8cadcf7f33765eb4bfc89f32286d3febdc0c0c99bf3fa
-
SHA512
119588fbfa918e620fb46103f55909453e1471dd4cb61ce59f1cfb49e8a1d8a837952f820500639207dcef2fb8ea7500e5a0d224f73c51fd9191cd88d3091a7e
-
SSDEEP
24576:Kr6ZB3xC3Bjut2ERKRJ+ZF3GwvNhi/hPvP6qVj9YuhmqKEJNDA+mFR9br:KmPx0uMEQJ+ZF2UNiFP3SjE8zR1
-
Quasar payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-