General
-
Target
871aba48f83ffff6c8ffa062548e7500_NEIKI
-
Size
417KB
-
Sample
240508-nmj7xaac8y
-
MD5
871aba48f83ffff6c8ffa062548e7500
-
SHA1
c81b112aff8e1d2921e0fa0c85e715c5f869565e
-
SHA256
e0755e81ddb11f45d9f10944d8cc5e3f4d772277aa20bb154c8ab2b3765a5512
-
SHA512
5fe08e9523645532ee9949000805ce113b06961912bcf650c4b9aa80a54d3bc8903c75d2a17902eab3cb71f7cc5b39d291be5dfbab3cbc62b892eb85df780288
-
SSDEEP
6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtaq:Gvqq7cumorCFKpnq/OFr8pvKStK6
Static task
static1
Behavioral task
behavioral1
Sample
871aba48f83ffff6c8ffa062548e7500_NEIKI.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
871aba48f83ffff6c8ffa062548e7500_NEIKI
-
Size
417KB
-
MD5
871aba48f83ffff6c8ffa062548e7500
-
SHA1
c81b112aff8e1d2921e0fa0c85e715c5f869565e
-
SHA256
e0755e81ddb11f45d9f10944d8cc5e3f4d772277aa20bb154c8ab2b3765a5512
-
SHA512
5fe08e9523645532ee9949000805ce113b06961912bcf650c4b9aa80a54d3bc8903c75d2a17902eab3cb71f7cc5b39d291be5dfbab3cbc62b892eb85df780288
-
SSDEEP
6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtaq:Gvqq7cumorCFKpnq/OFr8pvKStK6
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-