General

  • Target

    49c86f3d6b110d39cdb9cc6568836110_NeikiAnalytics.exe

  • Size

    133KB

  • Sample

    240612-2j5akatbpg

  • MD5

    49c86f3d6b110d39cdb9cc6568836110

  • SHA1

    304453b1dfab2041077095dde8a2d2952ed58d7c

  • SHA256

    99099442b50b43c08847412a31c78ca2a46a984e3fdfdbbc66ddf2d74bfcbd94

  • SHA512

    4b898209dfb1fd00cc98a6d136107851338b598fcd5c9e4a05003928aebf3fd1360ee8376094a96e1e6eb994e68c962f109ec399227fd05a2e9eb8da240e2f8e

  • SSDEEP

    3072:cEboFVlGAvwsgbpvYfMTc72L10fPsout6nnn:bBzsgbpvnTcyOPsoS6nnn

Score
7/10
upx

Malware Config

Targets

    • Target

      49c86f3d6b110d39cdb9cc6568836110_NeikiAnalytics.exe

    • Size

      133KB

    • MD5

      49c86f3d6b110d39cdb9cc6568836110

    • SHA1

      304453b1dfab2041077095dde8a2d2952ed58d7c

    • SHA256

      99099442b50b43c08847412a31c78ca2a46a984e3fdfdbbc66ddf2d74bfcbd94

    • SHA512

      4b898209dfb1fd00cc98a6d136107851338b598fcd5c9e4a05003928aebf3fd1360ee8376094a96e1e6eb994e68c962f109ec399227fd05a2e9eb8da240e2f8e

    • SSDEEP

      3072:cEboFVlGAvwsgbpvYfMTc72L10fPsout6nnn:bBzsgbpvnTcyOPsoS6nnn

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks