General
-
Target
1d2b1ba3f33c7907d4237f43da88fad0_NeikiAnalytics
-
Size
303KB
-
Sample
240510-2h4yeadf6y
-
MD5
1d2b1ba3f33c7907d4237f43da88fad0
-
SHA1
e039b949b860830e52cb605488a08b2427741dc0
-
SHA256
9d52880405f143f4767964297a44c5a2862eb9ef177d2698bdd3b0e9f274c50a
-
SHA512
3f32d854ab3ba8703af369d8c5ea27cd6867687d46fc1e5217752764ef1d284fdf77d7067e2309ee0427f44cebaeb67909a28f55d4ec1831585db8a336dd2869
-
SSDEEP
6144:5zUpbpjNOh1kAh/0PiAfhTBs9XDf3PAzVeC:8bpjNOEphKD3AzoC
Static task
static1
Behavioral task
behavioral1
Sample
1d2b1ba3f33c7907d4237f43da88fad0_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Targets
-
-
Target
1d2b1ba3f33c7907d4237f43da88fad0_NeikiAnalytics
-
Size
303KB
-
MD5
1d2b1ba3f33c7907d4237f43da88fad0
-
SHA1
e039b949b860830e52cb605488a08b2427741dc0
-
SHA256
9d52880405f143f4767964297a44c5a2862eb9ef177d2698bdd3b0e9f274c50a
-
SHA512
3f32d854ab3ba8703af369d8c5ea27cd6867687d46fc1e5217752764ef1d284fdf77d7067e2309ee0427f44cebaeb67909a28f55d4ec1831585db8a336dd2869
-
SSDEEP
6144:5zUpbpjNOh1kAh/0PiAfhTBs9XDf3PAzVeC:8bpjNOEphKD3AzoC
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-