General

  • Target

    7110063fa670b401af9c4d5d8412cbf0_NeikiAnalytics.exe

  • Size

    133KB

  • Sample

    240613-llmwasxbqk

  • MD5

    7110063fa670b401af9c4d5d8412cbf0

  • SHA1

    0f7b9270147c964f3309ad6f60f4fbd6505a3b95

  • SHA256

    403d6f91d0169f26172d6a25fb6d2d66e192406377c03020441c4a87b97cee4f

  • SHA512

    c782f7972ff5dc6169e44916783e4a844c383e41f044884e523a2b2edcce3887b9d9a5a565a2d75f38cea64e3237f4a3cf94d2859aff63dd98281e17e8551fc6

  • SSDEEP

    3072:mEboFVlGAvwsgbpvYfMTc72L10fPsout6nnn:1BzsgbpvnTcyOPsoS6nnn

Score
7/10
upx

Malware Config

Targets

    • Target

      7110063fa670b401af9c4d5d8412cbf0_NeikiAnalytics.exe

    • Size

      133KB

    • MD5

      7110063fa670b401af9c4d5d8412cbf0

    • SHA1

      0f7b9270147c964f3309ad6f60f4fbd6505a3b95

    • SHA256

      403d6f91d0169f26172d6a25fb6d2d66e192406377c03020441c4a87b97cee4f

    • SHA512

      c782f7972ff5dc6169e44916783e4a844c383e41f044884e523a2b2edcce3887b9d9a5a565a2d75f38cea64e3237f4a3cf94d2859aff63dd98281e17e8551fc6

    • SSDEEP

      3072:mEboFVlGAvwsgbpvYfMTc72L10fPsout6nnn:1BzsgbpvnTcyOPsoS6nnn

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks