Overview
overview
10Static
static
10Neon — �...6).exe
windows7_x64
10Neon — �...6).exe
windows10-2004_x64
10Neon — �...7).exe
windows7_x64
10Neon — �...7).exe
windows10-2004_x64
10Neon — �...8).exe
windows7_x64
10Neon — �...8).exe
windows10-2004_x64
10Neon — �...9).exe
windows7_x64
10Neon — �...9).exe
windows10-2004_x64
10Neon — �...2).exe
windows7_x64
10Neon — �...2).exe
windows10-2004_x64
10Neon — �...0).exe
windows7_x64
10Neon — �...0).exe
windows10-2004_x64
10Neon — �...1).exe
windows7_x64
10Neon — �...1).exe
windows10-2004_x64
10Neon — �...2).exe
windows7_x64
10Neon — �...2).exe
windows10-2004_x64
10Neon — �...3).exe
windows7_x64
10Neon — �...3).exe
windows10-2004_x64
10Neon — �...4).exe
windows7_x64
10Neon — �...4).exe
windows10-2004_x64
10Neon — �...5).exe
windows7_x64
10Neon — �...5).exe
windows10-2004_x64
10Neon — �...6).exe
windows7_x64
10Neon — �...6).exe
windows10-2004_x64
10Neon — �...7).exe
windows7_x64
10Neon — �...7).exe
windows10-2004_x64
10Neon — �...8).exe
windows7_x64
10Neon — �...8).exe
windows10-2004_x64
10Neon — �...9).exe
windows7_x64
10Neon — �...9).exe
windows10-2004_x64
10Neon — �...я.exe
windows7_x64
10Neon — �...я.exe
windows10-2004_x64
10General
-
Target
Neon.rar
-
Size
2.3MB
-
Sample
220314-rp8j3aadbk
-
MD5
6bbd9443b21588a492e636ff3ffae9a1
-
SHA1
97e6de76715c3448c5bc5b7bf60796726e50239e
-
SHA256
58c9fcd2f426847639c5dc1ff65943c2d12285cbe02297f551038f82c0fec303
-
SHA512
e472bc8ea4558e18ef056af5c187d9d0655d22326b6a5b95f8c1651fcd54f2bae517c7fc858cac2c23a319d91c15cd08b61e1342dba490b63786d1ce521c2c5c
Static task
static1
Behavioral task
behavioral1
Sample
Neon — копия (16).exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Neon — копия (16).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
Neon — копия (17).exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
Neon — копия (17).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
Neon — копия (18).exe
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
Neon — копия (18).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
Neon — копия (19).exe
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
Neon — копия (19).exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
Neon — копия (2).exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
Neon — копия (2).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
Neon — копия (20).exe
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
Neon — копия (20).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
Neon — копия (21).exe
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
Neon — копия (21).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
Neon — копия (22).exe
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
Neon — копия (22).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
Neon — копия (3).exe
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
Neon — копия (3).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
Neon — копия (4).exe
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
Neon — копия (4).exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
Neon — копия (5).exe
Resource
win7-20220311-en
Behavioral task
behavioral22
Sample
Neon — копия (5).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
Neon — копия (6).exe
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
Neon — копия (6).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
Neon — копия (7).exe
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
Neon — копия (7).exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
Neon — копия (8).exe
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
Neon — копия (8).exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
Neon — копия (9).exe
Resource
win7-20220311-en
Behavioral task
behavioral30
Sample
Neon — копия (9).exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral31
Sample
Neon — копия.exe
Resource
win7-20220311-en
Behavioral task
behavioral32
Sample
Neon — копия.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/952308393677291551/Kwqtw7eOhhDiE0L0w2X3Hwo9TDPq265Rqw2_8lcfVw_arvjLeTNzn4AG-J-I4NctgVFh
Targets
-
-
Target
Neon — копия (16).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (17).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (18).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (19).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (2).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (20).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (21).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (22).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (3).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (4).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (5).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (6).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (7).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (8).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия (9).exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Neon — копия.exe
-
Size
274KB
-
MD5
6d9153402403207366b080ff8154fe03
-
SHA1
69c7ed7b664cecd5a721677588f0904d381a4a49
-
SHA256
d7450131c835b2df9dcea263bf7f73d03238698a63b6a6fe9faa35ea59439731
-
SHA512
1e1704138ec5a8065afcedf78c3225a0ce2ee6c33459f52933c9b447eab18ae9eb457a6bf207b4afbfa7790af2788beee3f3b431cafcb2bc3a5a4f4ab224a952
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-