Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 03:33

General

  • Target

    5a61f9d4e3c0c40e663a289dc8d5de6f4a123703ac447a35e717846ce94108cb_NeikiAnalytics.exe

  • Size

    453KB

  • MD5

    5f157433f390bffff8e7a20a94ece0a0

  • SHA1

    eba5d8a57f7934ef2c8a633850ec1b8c73e04f2c

  • SHA256

    5a61f9d4e3c0c40e663a289dc8d5de6f4a123703ac447a35e717846ce94108cb

  • SHA512

    097169246b4a95460dfadb067e10c666f2a12fdb7a20031dd5c690dd9ccd5a708444ce9c1933a9716aee2ba5eb610bf55da6f9a6a9ce9b9fb560a4239586b356

  • SSDEEP

    12288:CO3O/mpDCDFBbNr/kSmycgam/qqECsw/:v3oAaZ/kryc1+BE7G

Score
10/10

Malware Config

Signatures

  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a61f9d4e3c0c40e663a289dc8d5de6f4a123703ac447a35e717846ce94108cb_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a61f9d4e3c0c40e663a289dc8d5de6f4a123703ac447a35e717846ce94108cb_NeikiAnalytics.exe"
    1⤵
      PID:1840

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1840-0-0x0000000010074000-0x0000000010107000-memory.dmp

      Filesize

      588KB

    • memory/1840-1-0x0000000010000000-0x0000000010107000-memory.dmp

      Filesize

      1.0MB

    • memory/1840-2-0x0000000010074000-0x0000000010107000-memory.dmp

      Filesize

      588KB

    • memory/1840-3-0x0000000010000000-0x0000000010107000-memory.dmp

      Filesize

      1.0MB