General
-
Target
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI
-
Size
2.2MB
-
Sample
240508-r1fy7ahd4w
-
MD5
ddfbc3b32cbe7636e8976d8a4aee4a00
-
SHA1
baa8bb1168d9ee2e2f57646394cdc0760a61a133
-
SHA256
7b76d9fb50dc5f83d25b339efe8dc7f66c6d645cc3b14f1e4b8091ef4220ea42
-
SHA512
76273c96d61588601194f4dd0e2557b05c45a3a6688c8d1014159bc2c6ec590bc809a9f24464e9058d2416725f944d0c412047da9360df21cb1f376eaa1f696e
-
SSDEEP
49152:ozTmfXYjqGUBL6F7+8Pu/ZF26QreE26pKdzj58oz9InwWlLoZot:IuCqmF7+FSrLadz98U9B
Static task
static1
Behavioral task
behavioral1
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
asyncrat
0.5.8
Default
tomx.brasilia.me:6606
tomx.brasilia.me:7707
tomx.brasilia.me:8808
91.92.250.227:6606
91.92.250.227:7707
91.92.250.227:8808
vWKJAJDsDf09
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI
-
Size
2.2MB
-
MD5
ddfbc3b32cbe7636e8976d8a4aee4a00
-
SHA1
baa8bb1168d9ee2e2f57646394cdc0760a61a133
-
SHA256
7b76d9fb50dc5f83d25b339efe8dc7f66c6d645cc3b14f1e4b8091ef4220ea42
-
SHA512
76273c96d61588601194f4dd0e2557b05c45a3a6688c8d1014159bc2c6ec590bc809a9f24464e9058d2416725f944d0c412047da9360df21cb1f376eaa1f696e
-
SSDEEP
49152:ozTmfXYjqGUBL6F7+8Pu/ZF26QreE26pKdzj58oz9InwWlLoZot:IuCqmF7+FSrLadz98U9B
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-