General
-
Target
26e67fd264371701c3b7e0e2ada30980_NEIKI
-
Size
416KB
-
Sample
240508-j8er4adg34
-
MD5
26e67fd264371701c3b7e0e2ada30980
-
SHA1
b4e80344ab76faf4414982d79b7ad0307264412c
-
SHA256
6ea0b55bd9ae6db1e9a74279e4e647f2d203fa43f05bf4a853882bf3d3779374
-
SHA512
b587a1b860e3bf594621082b899e44912749654021269d0738def79d4247ac7778e4ed2bcd8fe49d9e0435b543c12b56b72816e1e5cf7be6292b8686259f009c
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt61:MmZYR8jHhuYF161
Static task
static1
Behavioral task
behavioral1
Sample
26e67fd264371701c3b7e0e2ada30980_NEIKI.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
26e67fd264371701c3b7e0e2ada30980_NEIKI
-
Size
416KB
-
MD5
26e67fd264371701c3b7e0e2ada30980
-
SHA1
b4e80344ab76faf4414982d79b7ad0307264412c
-
SHA256
6ea0b55bd9ae6db1e9a74279e4e647f2d203fa43f05bf4a853882bf3d3779374
-
SHA512
b587a1b860e3bf594621082b899e44912749654021269d0738def79d4247ac7778e4ed2bcd8fe49d9e0435b543c12b56b72816e1e5cf7be6292b8686259f009c
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt61:MmZYR8jHhuYF161
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-