General
-
Target
22e6ceb793cadf2240dc8ef80256ab70_NEIKI
-
Size
315KB
-
Sample
240507-y495rsea2w
-
MD5
22e6ceb793cadf2240dc8ef80256ab70
-
SHA1
487c9a28b5376a8ae52949a641577973a26b0332
-
SHA256
c4c6c049297b61a26b8c7e7988f849d37f5c84066ffae5ba2d2b7f753991f414
-
SHA512
33bb1d712b10ecbdc4864b2c10390f32253a072dc485137723ae62d507a141cd57ce5d63b9f5b080c9c5ba8d0b5665271a605c95c215268cef3d50018c3e75f8
-
SSDEEP
6144:ROtpenO/16bfrgdhNlX6Qy9MwC8wGB9/p6TxTyc:RLnQ1AihNlX6if8wGB9Raz
Static task
static1
Behavioral task
behavioral1
Sample
22e6ceb793cadf2240dc8ef80256ab70_NEIKI.exe
Resource
win7-20240221-en
Malware Config
Extracted
nanocore
1.2.2.0
now.publicvm.com:6099
renegade.globedns.info:6099
ae9df786-bcf6-4a7d-9260-0af46168900a
-
activate_away_mode
true
-
backup_connection_host
renegade.globedns.info
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2014-12-12T13:57:27.450992036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6099
-
default_group
DataProt-Unicorn
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ae9df786-bcf6-4a7d-9260-0af46168900a
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
now.publicvm.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
22e6ceb793cadf2240dc8ef80256ab70_NEIKI
-
Size
315KB
-
MD5
22e6ceb793cadf2240dc8ef80256ab70
-
SHA1
487c9a28b5376a8ae52949a641577973a26b0332
-
SHA256
c4c6c049297b61a26b8c7e7988f849d37f5c84066ffae5ba2d2b7f753991f414
-
SHA512
33bb1d712b10ecbdc4864b2c10390f32253a072dc485137723ae62d507a141cd57ce5d63b9f5b080c9c5ba8d0b5665271a605c95c215268cef3d50018c3e75f8
-
SSDEEP
6144:ROtpenO/16bfrgdhNlX6Qy9MwC8wGB9/p6TxTyc:RLnQ1AihNlX6if8wGB9Raz
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-