General
-
Target
30dc2290b6b7bad31e59c18d4550117c79a7c36aeb09ca5f54714579adce11a2_NeikiAnalytics.exe
-
Size
808KB
-
Sample
240620-eff28s1hmk
-
MD5
97f0e987446dc19d888bff693ae44eb0
-
SHA1
5f8f941d3197cb6c0b314e966d677ad3e340594c
-
SHA256
30dc2290b6b7bad31e59c18d4550117c79a7c36aeb09ca5f54714579adce11a2
-
SHA512
a5ee9ee3779ea9e579f7f41d0a98d433f2b0f12ee64f6f234612a53b1b29772b7384ecbcdef262dff68ca113a8eea8135e19321fa4efc1fca329acf0e1801e44
-
SSDEEP
12288:iRhNJJWyiyLqgqXGb0krJIDnv44WpPCaq8hFVZwyWgG0DOFdgf0FBPdAA:wWuLqCOT44WphTZjGPFdBA
Static task
static1
Behavioral task
behavioral1
Sample
30dc2290b6b7bad31e59c18d4550117c79a7c36aeb09ca5f54714579adce11a2_NeikiAnalytics.exe
Resource
win7-20240611-en
Malware Config
Extracted
xworm
192.168.1.8:7000
-
Install_directory
%AppData%
-
install_file
XClienamrt.exe
Targets
-
-
Target
30dc2290b6b7bad31e59c18d4550117c79a7c36aeb09ca5f54714579adce11a2_NeikiAnalytics.exe
-
Size
808KB
-
MD5
97f0e987446dc19d888bff693ae44eb0
-
SHA1
5f8f941d3197cb6c0b314e966d677ad3e340594c
-
SHA256
30dc2290b6b7bad31e59c18d4550117c79a7c36aeb09ca5f54714579adce11a2
-
SHA512
a5ee9ee3779ea9e579f7f41d0a98d433f2b0f12ee64f6f234612a53b1b29772b7384ecbcdef262dff68ca113a8eea8135e19321fa4efc1fca329acf0e1801e44
-
SSDEEP
12288:iRhNJJWyiyLqgqXGb0krJIDnv44WpPCaq8hFVZwyWgG0DOFdgf0FBPdAA:wWuLqCOT44WphTZjGPFdBA
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-