General
-
Target
79f01f9e0e515a908610a28f588d4240_NeikiAnalytics
-
Size
407KB
-
Sample
240510-fvctssch4y
-
MD5
79f01f9e0e515a908610a28f588d4240
-
SHA1
bdb22ac98935cdb0a13d9e0b47b712a10f7c7b00
-
SHA256
8c661fccc13365527e0bdd534fd7db081471c3c3e878ba21f2fa4d883ef1d762
-
SHA512
01d1fdfb7d35e6cb481ea93ced5fc93ff6c08045edcf463d4ee6bdf52f9f24ce7aa58e49a8ec3f56034901600b7492e981cd3793e787950f7c54a2e653a6746a
-
SSDEEP
6144:GTQUPE2+RiUWOKgOskmpSjYLpafrzEWHfAjm1wd/SEWOikSnLdTuBVdEL4tRq:GZlOLOsajYVcE2KEySnxUdELuRq
Static task
static1
Behavioral task
behavioral1
Sample
79f01f9e0e515a908610a28f588d4240_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
79f01f9e0e515a908610a28f588d4240_NeikiAnalytics
-
Size
407KB
-
MD5
79f01f9e0e515a908610a28f588d4240
-
SHA1
bdb22ac98935cdb0a13d9e0b47b712a10f7c7b00
-
SHA256
8c661fccc13365527e0bdd534fd7db081471c3c3e878ba21f2fa4d883ef1d762
-
SHA512
01d1fdfb7d35e6cb481ea93ced5fc93ff6c08045edcf463d4ee6bdf52f9f24ce7aa58e49a8ec3f56034901600b7492e981cd3793e787950f7c54a2e653a6746a
-
SSDEEP
6144:GTQUPE2+RiUWOKgOskmpSjYLpafrzEWHfAjm1wd/SEWOikSnLdTuBVdEL4tRq:GZlOLOsajYVcE2KEySnxUdELuRq
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-