General
-
Target
4eb421df822148dffa6e54fa7e202ae0_NeikiAnalytics.exe
-
Size
352KB
-
Sample
240617-ftam2szdnn
-
MD5
4eb421df822148dffa6e54fa7e202ae0
-
SHA1
b67a7708186ce39a67cf2856fe643d680b02dd8a
-
SHA256
3ced70c5a6a6f5c570eed9d95d13dc5a471a0830fb13fa71a4435ecacf6fda57
-
SHA512
feacc532954d606815783f974ea76295786cc50bc8eb01385bbf82163b34522b8360283140f81f5c1c34f45d1199541b5284c91e8c20bfef091b1393b804c2c7
-
SSDEEP
6144:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:rKofHfHTXQLzgvnzHPowYbvrjD/L7QPs
Static task
static1
Behavioral task
behavioral1
Sample
4eb421df822148dffa6e54fa7e202ae0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4eb421df822148dffa6e54fa7e202ae0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
4eb421df822148dffa6e54fa7e202ae0_NeikiAnalytics.exe
-
Size
352KB
-
MD5
4eb421df822148dffa6e54fa7e202ae0
-
SHA1
b67a7708186ce39a67cf2856fe643d680b02dd8a
-
SHA256
3ced70c5a6a6f5c570eed9d95d13dc5a471a0830fb13fa71a4435ecacf6fda57
-
SHA512
feacc532954d606815783f974ea76295786cc50bc8eb01385bbf82163b34522b8360283140f81f5c1c34f45d1199541b5284c91e8c20bfef091b1393b804c2c7
-
SSDEEP
6144:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:rKofHfHTXQLzgvnzHPowYbvrjD/L7QPs
Score8/10-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-