General

  • Target

    3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240620-g9zgsaybmp

  • MD5

    ee4b1348bea0e0f67b4345f7889d7a20

  • SHA1

    f68aea4feeeaa9ddd13491b1dcfa3e34d909abf2

  • SHA256

    3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242

  • SHA512

    ec974b2b61bc6e205d91c40bbc5a70265f0a8fa6c30f12f562a0ead806fb9f17dcef69f3b044b5981d8877fa2b7f759f997b6870e59f76ab87599d2f8d4623e4

  • SSDEEP

    49152:YZ+ZKAKXsNolSGaumNJyo63e/gMirsV7G16PVtv0Qvx8M:c1/sNo0X9aSgQ016PXxR

Score
7/10
upx

Malware Config

Targets

    • Target

      3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      ee4b1348bea0e0f67b4345f7889d7a20

    • SHA1

      f68aea4feeeaa9ddd13491b1dcfa3e34d909abf2

    • SHA256

      3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242

    • SHA512

      ec974b2b61bc6e205d91c40bbc5a70265f0a8fa6c30f12f562a0ead806fb9f17dcef69f3b044b5981d8877fa2b7f759f997b6870e59f76ab87599d2f8d4623e4

    • SSDEEP

      49152:YZ+ZKAKXsNolSGaumNJyo63e/gMirsV7G16PVtv0Qvx8M:c1/sNo0X9aSgQ016PXxR

    Score
    7/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks