General
-
Target
35e81af375057504f64b040dadb925a0_NeikiAnalytics
-
Size
404KB
-
Sample
240509-ph47ysca35
-
MD5
35e81af375057504f64b040dadb925a0
-
SHA1
09d84c804ae114c7df70a7ff5c2c5a4e24d867ac
-
SHA256
6b9236494e6c5744ad90c129176ce3ef3e4565480f52543a8e70cdd1c977c608
-
SHA512
6f48ae576de3ca821117ea78067d414d6c1552a556662de9618443664330e7bfe1b6fcab0b52646b66c141e3c40a184c2a125c4e888ee2f35f9a8c30c389c317
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf8:z5mLrD8xgzJu3zu4Nf5XmiUOw8
Static task
static1
Behavioral task
behavioral1
Sample
35e81af375057504f64b040dadb925a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
35e81af375057504f64b040dadb925a0_NeikiAnalytics
-
Size
404KB
-
MD5
35e81af375057504f64b040dadb925a0
-
SHA1
09d84c804ae114c7df70a7ff5c2c5a4e24d867ac
-
SHA256
6b9236494e6c5744ad90c129176ce3ef3e4565480f52543a8e70cdd1c977c608
-
SHA512
6f48ae576de3ca821117ea78067d414d6c1552a556662de9618443664330e7bfe1b6fcab0b52646b66c141e3c40a184c2a125c4e888ee2f35f9a8c30c389c317
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf8:z5mLrD8xgzJu3zu4Nf5XmiUOw8
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-