General
-
Target
b2fb1c0a2a784c8d19cb6e9319254661f370e6e5bbb34f9e77cc6901f97d01c1_NeikiAnalytics.exe
-
Size
2.6MB
-
Sample
240629-tt6bls1cpc
-
MD5
ed038e7fe58849684adc0d2dc13241d0
-
SHA1
14ab133f45c62415047324359daa6b92408976ad
-
SHA256
b2fb1c0a2a784c8d19cb6e9319254661f370e6e5bbb34f9e77cc6901f97d01c1
-
SHA512
37c021bb1d18d7590cda945f73d9dc71ed6f6029c6f9cdbeddc3a93d65fdad9833d7ad03a5e88bfc3aa4db8c13b544443997371d33ec5a3309ba5ed4f9641640
-
SSDEEP
49152:+XzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVF:+XzhW148Pd+Tf1mpcOldJQ3/VF
Behavioral task
behavioral1
Sample
b2fb1c0a2a784c8d19cb6e9319254661f370e6e5bbb34f9e77cc6901f97d01c1_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
b2fb1c0a2a784c8d19cb6e9319254661f370e6e5bbb34f9e77cc6901f97d01c1_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
ed038e7fe58849684adc0d2dc13241d0
-
SHA1
14ab133f45c62415047324359daa6b92408976ad
-
SHA256
b2fb1c0a2a784c8d19cb6e9319254661f370e6e5bbb34f9e77cc6901f97d01c1
-
SHA512
37c021bb1d18d7590cda945f73d9dc71ed6f6029c6f9cdbeddc3a93d65fdad9833d7ad03a5e88bfc3aa4db8c13b544443997371d33ec5a3309ba5ed4f9641640
-
SSDEEP
49152:+XzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVF:+XzhW148Pd+Tf1mpcOldJQ3/VF
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-