General
-
Target
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe
-
Size
2.4MB
-
Sample
240629-svhfhazfra
-
MD5
f1bd5a01ef30b911e6434ca101a30510
-
SHA1
154638461d818aeec509a7f774f98b7e66b84c8d
-
SHA256
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2
-
SHA512
88dba9f0caef2056e275135aea8ff5cb017eb8b041deb7f3564d950c94debf23420e529e433571a47deba80755d7c221827158481610ba41461c502213e6003a
-
SSDEEP
49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SB5:L3KkQMcNQlHG/oF8aUz0vnx9j
Behavioral task
behavioral1
Sample
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2_NeikiAnalytics.exe
-
Size
2.4MB
-
MD5
f1bd5a01ef30b911e6434ca101a30510
-
SHA1
154638461d818aeec509a7f774f98b7e66b84c8d
-
SHA256
b12ffa4b63607f278986d86b865d25d703ead7ae49e0c388b75294a5737eada2
-
SHA512
88dba9f0caef2056e275135aea8ff5cb017eb8b041deb7f3564d950c94debf23420e529e433571a47deba80755d7c221827158481610ba41461c502213e6003a
-
SSDEEP
49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SB5:L3KkQMcNQlHG/oF8aUz0vnx9j
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-