General
-
Target
a7729d3b05f874399ebbb6e5bf026f10_NeikiAnalytics.exe
-
Size
2.6MB
-
Sample
240614-glywcaxdnc
-
MD5
a7729d3b05f874399ebbb6e5bf026f10
-
SHA1
7c62fc44da9d3c25b36f415362905e5dd02866d3
-
SHA256
65820acb2aed10b813ebdadf051c0d21b6a31b229fb0259e867d7e149336587f
-
SHA512
59caa8eb0d0047eee5629165315666bf1711cbddb4de2b0b61c22d31e0177e585fc26c9cec1ce3e6f97126aaa9b1fb53c1f922f2d9a2b077b9b6cc53e3ec5aa1
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eh:ObCjPKNqQEfsw43qtmVfq4w
Static task
static1
Behavioral task
behavioral1
Sample
a7729d3b05f874399ebbb6e5bf026f10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a7729d3b05f874399ebbb6e5bf026f10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
a7729d3b05f874399ebbb6e5bf026f10_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
a7729d3b05f874399ebbb6e5bf026f10
-
SHA1
7c62fc44da9d3c25b36f415362905e5dd02866d3
-
SHA256
65820acb2aed10b813ebdadf051c0d21b6a31b229fb0259e867d7e149336587f
-
SHA512
59caa8eb0d0047eee5629165315666bf1711cbddb4de2b0b61c22d31e0177e585fc26c9cec1ce3e6f97126aaa9b1fb53c1f922f2d9a2b077b9b6cc53e3ec5aa1
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eh:ObCjPKNqQEfsw43qtmVfq4w
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-