General
-
Target
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f_NeikiAnalytics.exe
-
Size
1.6MB
-
Sample
240628-l7scxawgjk
-
MD5
fed375c3e4a264105c74f05e003c4e30
-
SHA1
080bca096f226ed6b494b6f4890f82ac29b535f6
-
SHA256
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f
-
SHA512
6ca605fc8c36ab63bc4ded2ad289b80cdc32338ed39154279a61bd4c790183f7d8fd2e18da691b4bbd95d67e9d533845e3e594c5b54c2044b9c668500a5106b2
-
SSDEEP
49152:7kTq24GjdGSiqkqXfd+/9AqYanieKds2:71EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1253848626141069427/8gb3Rvzug5oizArtaaYW_nFUyBmEHQUqzrod7AjWuO-oQ2waS6Iw6ZaOSNBmOLM2rvbq
Targets
-
-
Target
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
fed375c3e4a264105c74f05e003c4e30
-
SHA1
080bca096f226ed6b494b6f4890f82ac29b535f6
-
SHA256
92a7970772fe5ddd8bf61415b5b3666c9485d1e819cba631fdbf314c5dcdff3f
-
SHA512
6ca605fc8c36ab63bc4ded2ad289b80cdc32338ed39154279a61bd4c790183f7d8fd2e18da691b4bbd95d67e9d533845e3e594c5b54c2044b9c668500a5106b2
-
SSDEEP
49152:7kTq24GjdGSiqkqXfd+/9AqYanieKds2:71EjdGSiqkqXf0FLYW
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-