General

  • Target

    62c15f44a494185a7b011e8b1cca56a74c1ae98117326e5d87b3ad52a325b637_NeikiAnalytics.exe

  • Size

    455KB

  • Sample

    240624-l836ssxanc

  • MD5

    d2955c41828b23d41371745489ca36c0

  • SHA1

    fb30d7c3267b4fc42ff338b7979557a85ce4045b

  • SHA256

    62c15f44a494185a7b011e8b1cca56a74c1ae98117326e5d87b3ad52a325b637

  • SHA512

    7fa404d5defab5ad714b37c05b44dec8e6c49f33a3bad77e54e9a28d15b922e4e0fd76a8ed1f72925f4efee47ff82030b7e277d539d19a8d26950470b7656d46

  • SSDEEP

    6144:mBapC9DUIYmO5Kv5Q7X/l/rYvkW1VxxfnzrV9UAH0ctkPfc92F8pLpIh9jil:5pQD+mO5KWy/zrVbt4fcY29U9jI

Score
7/10

Malware Config

Targets

    • Target

      62c15f44a494185a7b011e8b1cca56a74c1ae98117326e5d87b3ad52a325b637_NeikiAnalytics.exe

    • Size

      455KB

    • MD5

      d2955c41828b23d41371745489ca36c0

    • SHA1

      fb30d7c3267b4fc42ff338b7979557a85ce4045b

    • SHA256

      62c15f44a494185a7b011e8b1cca56a74c1ae98117326e5d87b3ad52a325b637

    • SHA512

      7fa404d5defab5ad714b37c05b44dec8e6c49f33a3bad77e54e9a28d15b922e4e0fd76a8ed1f72925f4efee47ff82030b7e277d539d19a8d26950470b7656d46

    • SSDEEP

      6144:mBapC9DUIYmO5Kv5Q7X/l/rYvkW1VxxfnzrV9UAH0ctkPfc92F8pLpIh9jil:5pQD+mO5KWy/zrVbt4fcY29U9jI

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks