General

  • Target

    4243e5696edb792c191c52cddd267f60_NeikiAnalytics.exe

  • Size

    141KB

  • Sample

    240612-zf91jazalb

  • MD5

    4243e5696edb792c191c52cddd267f60

  • SHA1

    4ff65d112a13d819254f493cae325c06fc673d74

  • SHA256

    70e3818a4116f3331309b0d68ba96e49ad7e1fcca92108868a8ca75a550da205

  • SHA512

    dc63d5f795b973f353a10225a4460945f771e4174fb8f73aa1e68e17241e124f52af80878fd356a92f3c07632913195a85665707a77c5a46210b694204836a42

  • SSDEEP

    3072:fnyiQSohsUsxe+erZs1o8k1o8cQSohsUsxe+erZs1o8k1o8i:KiQSohsUsxe+e0QSohsUsxe+e6

Score
9/10

Malware Config

Targets

    • Target

      4243e5696edb792c191c52cddd267f60_NeikiAnalytics.exe

    • Size

      141KB

    • MD5

      4243e5696edb792c191c52cddd267f60

    • SHA1

      4ff65d112a13d819254f493cae325c06fc673d74

    • SHA256

      70e3818a4116f3331309b0d68ba96e49ad7e1fcca92108868a8ca75a550da205

    • SHA512

      dc63d5f795b973f353a10225a4460945f771e4174fb8f73aa1e68e17241e124f52af80878fd356a92f3c07632913195a85665707a77c5a46210b694204836a42

    • SSDEEP

      3072:fnyiQSohsUsxe+erZs1o8k1o8cQSohsUsxe+erZs1o8k1o8i:KiQSohsUsxe+e0QSohsUsxe+e6

    Score
    9/10
    • Renames multiple (514) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks