General
-
Target
2f3a0ad4dbe00ab099220a9508a622b0_NeikiAnalytics.exe
-
Size
163KB
-
Sample
240618-krs4tszflm
-
MD5
2f3a0ad4dbe00ab099220a9508a622b0
-
SHA1
2bce376c13da497ced76690ac55cdad436d07461
-
SHA256
a45caeb445cf7e71ecd304121f58d0b8c95712027f24a8531e34e3b4a4da18dc
-
SHA512
aff4765fc95a47f0620bcb1cd5e9ad181f14b690c4bb23ae7d3191a15013e97dd9311b4ae130bf70d466178deff7ed701bfe1ebe6c928b73e1704f5c66f6fc07
-
SSDEEP
3072:gSJd9deBMXuFI7o9IN0GltOrWKDBr+yJb:gyAJtuN0GLOf
Static task
static1
Behavioral task
behavioral1
Sample
2f3a0ad4dbe00ab099220a9508a622b0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f3a0ad4dbe00ab099220a9508a622b0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
gozi
Targets
-
-
Target
2f3a0ad4dbe00ab099220a9508a622b0_NeikiAnalytics.exe
-
Size
163KB
-
MD5
2f3a0ad4dbe00ab099220a9508a622b0
-
SHA1
2bce376c13da497ced76690ac55cdad436d07461
-
SHA256
a45caeb445cf7e71ecd304121f58d0b8c95712027f24a8531e34e3b4a4da18dc
-
SHA512
aff4765fc95a47f0620bcb1cd5e9ad181f14b690c4bb23ae7d3191a15013e97dd9311b4ae130bf70d466178deff7ed701bfe1ebe6c928b73e1704f5c66f6fc07
-
SSDEEP
3072:gSJd9deBMXuFI7o9IN0GltOrWKDBr+yJb:gyAJtuN0GLOf
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-