General
-
Target
1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb_NeikiAnalytics.exe
-
Size
2.6MB
-
Sample
240623-21cxmszglq
-
MD5
36241015273142ee5bb9303fd3beeb70
-
SHA1
a28c192bc7e4d9f4bc8946f7c4642920cf572525
-
SHA256
1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb
-
SHA512
819c537f25c0a2fce503c632af7705ece1472efada970ba64b30dfa43afe7f512949e7dcb6cea1cfc1d00b8c45ce655cd4091ac3b35d615211f2f7371d8297ab
-
SSDEEP
49152:YXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVh:YXzhW148Pd+Tf1mpcOldJQ3/Vh
Behavioral task
behavioral1
Sample
1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
36241015273142ee5bb9303fd3beeb70
-
SHA1
a28c192bc7e4d9f4bc8946f7c4642920cf572525
-
SHA256
1a91bddb8ca4c6d6b90d2d797dc3d9e99cacd3cae98c9ac83e64e7ec732999fb
-
SHA512
819c537f25c0a2fce503c632af7705ece1472efada970ba64b30dfa43afe7f512949e7dcb6cea1cfc1d00b8c45ce655cd4091ac3b35d615211f2f7371d8297ab
-
SSDEEP
49152:YXzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVh:YXzhW148Pd+Tf1mpcOldJQ3/Vh
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-