General
-
Target
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe
-
Size
1.6MB
-
Sample
240620-g9zgsaybmp
-
MD5
ee4b1348bea0e0f67b4345f7889d7a20
-
SHA1
f68aea4feeeaa9ddd13491b1dcfa3e34d909abf2
-
SHA256
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242
-
SHA512
ec974b2b61bc6e205d91c40bbc5a70265f0a8fa6c30f12f562a0ead806fb9f17dcef69f3b044b5981d8877fa2b7f759f997b6870e59f76ab87599d2f8d4623e4
-
SSDEEP
49152:YZ+ZKAKXsNolSGaumNJyo63e/gMirsV7G16PVtv0Qvx8M:c1/sNo0X9aSgQ016PXxR
Behavioral task
behavioral1
Sample
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
ee4b1348bea0e0f67b4345f7889d7a20
-
SHA1
f68aea4feeeaa9ddd13491b1dcfa3e34d909abf2
-
SHA256
3f38aab09a8ac04cd49ae46a7a6a2c012c6e0b0a309f3bbabcd3e0d8e7327242
-
SHA512
ec974b2b61bc6e205d91c40bbc5a70265f0a8fa6c30f12f562a0ead806fb9f17dcef69f3b044b5981d8877fa2b7f759f997b6870e59f76ab87599d2f8d4623e4
-
SSDEEP
49152:YZ+ZKAKXsNolSGaumNJyo63e/gMirsV7G16PVtv0Qvx8M:c1/sNo0X9aSgQ016PXxR
Score7/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-