General
-
Target
ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba_NeikiAnalytics.exe
-
Size
3.6MB
-
Sample
240629-q8t1cayfjd
-
MD5
b791e8bd8c7d20c1dc4ae429fd5c9510
-
SHA1
364f775fbf6de3ff301789b2781554615fc06348
-
SHA256
ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba
-
SHA512
362d932e29a49be3a01b0adda636b4b182a8413f70c5557bf9106754f5aa18b3f5d9d2f15f27d74342f35940cb1ba89178f81deadad5a8c6fa27caa6b054065a
-
SSDEEP
49152:ijkvhKZu1NYjxFF9JQHDI0lY2yLJ1rBMsohjGv/piXzN0tx4SnpUBO:ijk3Lq9YDDlfyfvv/n4Sp+
Behavioral task
behavioral1
Sample
ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba_NeikiAnalytics.dll
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
b791e8bd8c7d20c1dc4ae429fd5c9510
-
SHA1
364f775fbf6de3ff301789b2781554615fc06348
-
SHA256
ae46f22b6626be01f4f196b4c4244322378d83e2482c8c466d0b8beec54022ba
-
SHA512
362d932e29a49be3a01b0adda636b4b182a8413f70c5557bf9106754f5aa18b3f5d9d2f15f27d74342f35940cb1ba89178f81deadad5a8c6fa27caa6b054065a
-
SSDEEP
49152:ijkvhKZu1NYjxFF9JQHDI0lY2yLJ1rBMsohjGv/piXzN0tx4SnpUBO:ijk3Lq9YDDlfyfvv/n4Sp+
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-