General
-
Target
9f7daf1f3d17c895af03f06bdfce53f0_NeikiAnalytics.exe
-
Size
344KB
-
Sample
240617-rvmvjsybmm
-
MD5
9f7daf1f3d17c895af03f06bdfce53f0
-
SHA1
6c8aae58b42130fa41eefe28b2b6129f9cfb1c6e
-
SHA256
0bff907263640e2285031a5ef0291a787e30655767db4ecc67f031430b66f292
-
SHA512
527877e3b34479540cbf9ad4e215ae1ec54926d7a5977930524a05872efbca7bfc3ffa953f95d34fb92345d382d6d8e7d39df9f553d3a398760b9b5f05a44abe
-
SSDEEP
6144:UEzn1FsToOe/gxcmHBHU6VwNQojwRaLVx/re7N16VMIfa6dkdYyTVxS5Mr:LznwAgx9HB1iNskfo1qMhiTyb
Behavioral task
behavioral1
Sample
9f7daf1f3d17c895af03f06bdfce53f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9f7daf1f3d17c895af03f06bdfce53f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\db\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Restore-My-Files.txt
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion
https://decoding.at
Extracted
C:\Users\Admin\Desktop\LockBit_Ransomware.hta
https://decoding.at/
http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or
https://decoding.at
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
https://bigblog.at
Targets
-
-
Target
9f7daf1f3d17c895af03f06bdfce53f0_NeikiAnalytics.exe
-
Size
344KB
-
MD5
9f7daf1f3d17c895af03f06bdfce53f0
-
SHA1
6c8aae58b42130fa41eefe28b2b6129f9cfb1c6e
-
SHA256
0bff907263640e2285031a5ef0291a787e30655767db4ecc67f031430b66f292
-
SHA512
527877e3b34479540cbf9ad4e215ae1ec54926d7a5977930524a05872efbca7bfc3ffa953f95d34fb92345d382d6d8e7d39df9f553d3a398760b9b5f05a44abe
-
SSDEEP
6144:UEzn1FsToOe/gxcmHBHU6VwNQojwRaLVx/re7N16VMIfa6dkdYyTVxS5Mr:LznwAgx9HB1iNskfo1qMhiTyb
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-