General
-
Target
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786_NeikiAnalytics.exe
-
Size
553KB
-
Sample
240628-pjqqysygnc
-
MD5
f7030b13576de49beebb29da2d5c8890
-
SHA1
26ccbc9c36c030258d5e38d59bf09423e5204750
-
SHA256
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786
-
SHA512
a29d7264c3040a04ca036641295670ca7c6678ad8b2092153c51acbf9cd91e05f273d0c7926f07f05d8569eb4e49d64bb3d2d31dd7741aea49aa5c2f5c9b38c6
-
SSDEEP
6144:oGyrwsYlcsaBx6ukx409hRpC75c7bx7+AeEgYXuRrPXCWvFza:bqwsYlc9jQ4cRA7W7bxqAeEgY+Zzvda
Static task
static1
Behavioral task
behavioral1
Sample
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+dkvgx.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4A806A3B1ACF67B8
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/4A806A3B1ACF67B8
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/4A806A3B1ACF67B8
http://xlowfznrg4wf7dli.ONION/4A806A3B1ACF67B8
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+iipfp.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1326466A3AF4F51
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1326466A3AF4F51
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1326466A3AF4F51
http://xlowfznrg4wf7dli.ONION/1326466A3AF4F51
Targets
-
-
Target
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786_NeikiAnalytics.exe
-
Size
553KB
-
MD5
f7030b13576de49beebb29da2d5c8890
-
SHA1
26ccbc9c36c030258d5e38d59bf09423e5204750
-
SHA256
006cb9242e9c08db01fcfedf3c1ec11e0e5e8178e07b6836154ad62fd5b64786
-
SHA512
a29d7264c3040a04ca036641295670ca7c6678ad8b2092153c51acbf9cd91e05f273d0c7926f07f05d8569eb4e49d64bb3d2d31dd7741aea49aa5c2f5c9b38c6
-
SSDEEP
6144:oGyrwsYlcsaBx6ukx409hRpC75c7bx7+AeEgYXuRrPXCWvFza:bqwsYlc9jQ4cRA7W7bxqAeEgY+Zzvda
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (375) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-