General

  • Target

    200f38eb3f7d065154b4b11c2def29e7a16110f5a5f31fb3bd44abe68846316c_NeikiAnalytics.exe

  • Size

    236KB

  • Sample

    240630-2nmw3s1enr

  • MD5

    70265a5a091f7850c08692a5a2a45790

  • SHA1

    192f368c9fa91a1b1f541da9b7238e611924af78

  • SHA256

    200f38eb3f7d065154b4b11c2def29e7a16110f5a5f31fb3bd44abe68846316c

  • SHA512

    ad678a1c830e08b3bc065989ea3ad15025643fceda5fbdea2401fa09ed4962aa06962031e690c53f0c1ffa359f4321898a245ff257dba0622284e075e1f4093f

  • SSDEEP

    3072:xwhu2emeyJlL9s0lpuFlRzceIX4+Xt5J9XjkeMg:8u2emey7L9PpufRA7I+XzjbM

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.freehostia.com
  • Port:
    21
  • Username:
    alamah52
  • Password:
    aZjmM1M79&

Targets

    • Target

      200f38eb3f7d065154b4b11c2def29e7a16110f5a5f31fb3bd44abe68846316c_NeikiAnalytics.exe

    • Size

      236KB

    • MD5

      70265a5a091f7850c08692a5a2a45790

    • SHA1

      192f368c9fa91a1b1f541da9b7238e611924af78

    • SHA256

      200f38eb3f7d065154b4b11c2def29e7a16110f5a5f31fb3bd44abe68846316c

    • SHA512

      ad678a1c830e08b3bc065989ea3ad15025643fceda5fbdea2401fa09ed4962aa06962031e690c53f0c1ffa359f4321898a245ff257dba0622284e075e1f4093f

    • SSDEEP

      3072:xwhu2emeyJlL9s0lpuFlRzceIX4+Xt5J9XjkeMg:8u2emey7L9PpufRA7I+XzjbM

    Score
    3/10

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks