General
-
Target
0dcadb6b3bc2d3a109891af0e2d44c70_NeikiAnalytics
-
Size
8.6MB
-
Sample
240509-17yx1shf4y
-
MD5
0dcadb6b3bc2d3a109891af0e2d44c70
-
SHA1
a24bbf9768220afe7066b6d9567523e97a124458
-
SHA256
a83d9be8a4466699a75dde9699fa632ee75704596f501b1da6f095717dff9541
-
SHA512
2f15e998ce6a4bd7f743c85b371d427e2572ac805db9207772f8772d97aad868ae88fdc28836970e6a1cc4a9ceb20b1766497957d0ef6939e37a544427db2c82
-
SSDEEP
196608:yMvz1YfOi2xki3ZSzMQcI11G5ChE3WjcpPP1sw2UMj1fAOyTZbdMvDlY9meYaRXI:yMvz1YfOi2xki3ZSzMQcI11G5ChE3WjT
Static task
static1
Behavioral task
behavioral1
Sample
0dcadb6b3bc2d3a109891af0e2d44c70_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0dcadb6b3bc2d3a109891af0e2d44c70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
91.92.253.87:1291
aliSaYgMg2ZAwhna
-
install_file
USB.exe
Targets
-
-
Target
0dcadb6b3bc2d3a109891af0e2d44c70_NeikiAnalytics
-
Size
8.6MB
-
MD5
0dcadb6b3bc2d3a109891af0e2d44c70
-
SHA1
a24bbf9768220afe7066b6d9567523e97a124458
-
SHA256
a83d9be8a4466699a75dde9699fa632ee75704596f501b1da6f095717dff9541
-
SHA512
2f15e998ce6a4bd7f743c85b371d427e2572ac805db9207772f8772d97aad868ae88fdc28836970e6a1cc4a9ceb20b1766497957d0ef6939e37a544427db2c82
-
SSDEEP
196608:yMvz1YfOi2xki3ZSzMQcI11G5ChE3WjcpPP1sw2UMj1fAOyTZbdMvDlY9meYaRXI:yMvz1YfOi2xki3ZSzMQcI11G5ChE3WjT
Score10/10-
Detect Xworm Payload
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-