General
-
Target
2fe6a99d5b9a11d0ad344ab3ec2cefd0_NEIKI
-
Size
372KB
-
Sample
240508-kj465aed67
-
MD5
2fe6a99d5b9a11d0ad344ab3ec2cefd0
-
SHA1
9812465bc9f90510f4e6fc70f5a1b7d3c1855a84
-
SHA256
d5c6b91854155aa588b8f8b4e6fde8ebd63a8242e8c5155b596af43ed4b18bfc
-
SHA512
069b42e1ad8d1d6573bc3e001605b4f5957bcdd1467734f32f9e04c4b8e0f6be03f244caa3cf9ac16c6fc201e6aa37c0fbede6592bade8f049a84f1a7d0dd40b
-
SSDEEP
6144:pl+08UGGfdzF7qxvwcB793ituNKkzXwGZTapY:p808UGgdtqrhauN3XwwapY
Static task
static1
Behavioral task
behavioral1
Sample
2fe6a99d5b9a11d0ad344ab3ec2cefd0_NEIKI.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2fe6a99d5b9a11d0ad344ab3ec2cefd0_NEIKI
-
Size
372KB
-
MD5
2fe6a99d5b9a11d0ad344ab3ec2cefd0
-
SHA1
9812465bc9f90510f4e6fc70f5a1b7d3c1855a84
-
SHA256
d5c6b91854155aa588b8f8b4e6fde8ebd63a8242e8c5155b596af43ed4b18bfc
-
SHA512
069b42e1ad8d1d6573bc3e001605b4f5957bcdd1467734f32f9e04c4b8e0f6be03f244caa3cf9ac16c6fc201e6aa37c0fbede6592bade8f049a84f1a7d0dd40b
-
SSDEEP
6144:pl+08UGGfdzF7qxvwcB793ituNKkzXwGZTapY:p808UGgdtqrhauN3XwwapY
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-