General
-
Target
27fd524dfc3cf051484b2338e4f772f0_NeikiAnalytics
-
Size
426KB
-
Sample
240510-aeg6paac49
-
MD5
27fd524dfc3cf051484b2338e4f772f0
-
SHA1
800567aea6e84a3e615047984ce5592204edb96e
-
SHA256
143eaeab209a1a7d6d54519bf50b18000ed231506af3f650e2021cbca325d1aa
-
SHA512
eb96715529e4897b1ddeb7cf2c817a57f05d0b70670d38871fd6ba065a2960b927d5028eb19c7a842796fcf6c70b6f33e6e7d53b9ef80cd4c311b5df40cebdde
-
SSDEEP
6144:noJn25SYjZ+SbVduVe3BJ33kXkLRrKFfVASAt25lKgH/fL:oJ25vZpbVdnBJ33YkifV8/gH/fL
Static task
static1
Behavioral task
behavioral1
Sample
27fd524dfc3cf051484b2338e4f772f0_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
27fd524dfc3cf051484b2338e4f772f0_NeikiAnalytics
-
Size
426KB
-
MD5
27fd524dfc3cf051484b2338e4f772f0
-
SHA1
800567aea6e84a3e615047984ce5592204edb96e
-
SHA256
143eaeab209a1a7d6d54519bf50b18000ed231506af3f650e2021cbca325d1aa
-
SHA512
eb96715529e4897b1ddeb7cf2c817a57f05d0b70670d38871fd6ba065a2960b927d5028eb19c7a842796fcf6c70b6f33e6e7d53b9ef80cd4c311b5df40cebdde
-
SSDEEP
6144:noJn25SYjZ+SbVduVe3BJ33kXkLRrKFfVASAt25lKgH/fL:oJ25vZpbVdnBJ33YkifV8/gH/fL
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-