General
-
Target
57d4e5602ac60212f7c422321c9b0b80_NEIKI
-
Size
767KB
-
Sample
240508-l291rshe48
-
MD5
57d4e5602ac60212f7c422321c9b0b80
-
SHA1
a6d42a59f9d8121cfaab73f4b2b416e229fbafcd
-
SHA256
8a2fc6d9e2cc5549bc52b8914be340fbd0f72ae63d6f8b7959d1854342767e26
-
SHA512
b725661cbd3d35d889289fb86a3ca2a6355768cd35e047ff82f64c7717759703c24af2f2ee7bc31f50af3fc073fe9a1dee560d71305f180a2cb56676021aeed0
-
SSDEEP
12288:BLS6MKtR/ZZ4xYalDPn+v1spR4R9xSQkyRZNQKMza1Nn9zD7N+bd0/:pS6MkR/ZytPnIY2bSQkyRZNXMzeN1o0/
Static task
static1
Behavioral task
behavioral1
Sample
57d4e5602ac60212f7c422321c9b0b80_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
57d4e5602ac60212f7c422321c9b0b80_NEIKI.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.strato.de - Port:
587 - Username:
[email protected] - Password:
Oy1)8JSu_qPx(rzV_{Xu
Targets
-
-
Target
57d4e5602ac60212f7c422321c9b0b80_NEIKI
-
Size
767KB
-
MD5
57d4e5602ac60212f7c422321c9b0b80
-
SHA1
a6d42a59f9d8121cfaab73f4b2b416e229fbafcd
-
SHA256
8a2fc6d9e2cc5549bc52b8914be340fbd0f72ae63d6f8b7959d1854342767e26
-
SHA512
b725661cbd3d35d889289fb86a3ca2a6355768cd35e047ff82f64c7717759703c24af2f2ee7bc31f50af3fc073fe9a1dee560d71305f180a2cb56676021aeed0
-
SSDEEP
12288:BLS6MKtR/ZZ4xYalDPn+v1spR4R9xSQkyRZNQKMza1Nn9zD7N+bd0/:pS6MkR/ZytPnIY2bSQkyRZNXMzeN1o0/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-