General
-
Target
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8_NeikiAnalytics.exe
-
Size
2.4MB
-
Sample
240701-kj78sa1hrd
-
MD5
61dac54b7073bfdd947c235a2eddc210
-
SHA1
69f06bc250c6676cbc400a86e151c39c25dfeec5
-
SHA256
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8
-
SHA512
7e2ac7a1497d2c948ba702f2c3206f53226eb699bc6079032804f2c22c0b1eb09a4c8e2c1694fdc33054f5ca2bd9b0ebda51953c8d20dc58bfb707ba6de543c8
-
SSDEEP
49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SBi:L3KkQMcNQlHG/oF8aUz0vnx94
Behavioral task
behavioral1
Sample
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8_NeikiAnalytics.exe
-
Size
2.4MB
-
MD5
61dac54b7073bfdd947c235a2eddc210
-
SHA1
69f06bc250c6676cbc400a86e151c39c25dfeec5
-
SHA256
43e15cc43184cdba5f3e2b986524d104f524bd17dd3e4e589953edeb993baff8
-
SHA512
7e2ac7a1497d2c948ba702f2c3206f53226eb699bc6079032804f2c22c0b1eb09a4c8e2c1694fdc33054f5ca2bd9b0ebda51953c8d20dc58bfb707ba6de543c8
-
SSDEEP
49152:L3KoBQxG9i9w4QclMHG/m9FBiC1y/uUNxff0vhtAFE9P/qX/SBi:L3KkQMcNQlHG/oF8aUz0vnx94
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-