General
-
Target
09d8e2f356ead589be3a2fa865d32e20_NEIKI
-
Size
2.3MB
-
Sample
240509-lejv3aag4w
-
MD5
09d8e2f356ead589be3a2fa865d32e20
-
SHA1
4be10417d29cbc14dfb469fa385f6f06b7f2c99c
-
SHA256
660598b830ca8956542ef9b0f7b4fa45a24c7b68e67f5d9d0b80e319c8655c99
-
SHA512
f968fd8a5a4bd610ef9c2146318b1970add0d59a571e8a611434d00d259e5f1f0899cec810e1260fec61f8a98e5f4433345ac4b7a479d0228328c3901f582057
-
SSDEEP
49152:ljBPcxYu8TcfGghtisGkcRTa/c1b26TLOvH8yk24tRr8VdjnWd4qFVpDr:l9PKYR03isEX1y6TK8H2iRr8xqF3H
Behavioral task
behavioral1
Sample
09d8e2f356ead589be3a2fa865d32e20_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09d8e2f356ead589be3a2fa865d32e20_NEIKI.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
AvydGQ8TIDH9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
AvydGQ8TIDH9
Targets
-
-
Target
09d8e2f356ead589be3a2fa865d32e20_NEIKI
-
Size
2.3MB
-
MD5
09d8e2f356ead589be3a2fa865d32e20
-
SHA1
4be10417d29cbc14dfb469fa385f6f06b7f2c99c
-
SHA256
660598b830ca8956542ef9b0f7b4fa45a24c7b68e67f5d9d0b80e319c8655c99
-
SHA512
f968fd8a5a4bd610ef9c2146318b1970add0d59a571e8a611434d00d259e5f1f0899cec810e1260fec61f8a98e5f4433345ac4b7a479d0228328c3901f582057
-
SSDEEP
49152:ljBPcxYu8TcfGghtisGkcRTa/c1b26TLOvH8yk24tRr8VdjnWd4qFVpDr:l9PKYR03isEX1y6TK8H2iRr8xqF3H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
PureLog Stealer payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-