General
-
Target
9c0f25deda5fd180238008b7b97fab10_NeikiAnalytics
-
Size
1.5MB
-
Sample
240510-hz2d3ada49
-
MD5
9c0f25deda5fd180238008b7b97fab10
-
SHA1
f65d5a0b184c6bc0866ea214b2dbe37135eb6f9c
-
SHA256
78ce536df6722793cde9eca1bc9f78bc4abe3d17613eb950401c1fbc0335142c
-
SHA512
6d5c2a12818e8f6b6e0260ef81c18409c9b4319fff3ec7000ccf5b6dfa29b933ccfadcc414f8af83d3ca2c3f7def5f52f1ca649c698691c742e3559a0fb317b3
-
SSDEEP
24576:8NNGBDaQ3lPIiTr9befL/s20Z7RMnaGq3Lpu/ukPew0t4OH6Lwu69wYzGXIgA/H7:/lVwzl0Z7zGq7ptw0t9RfP
Static task
static1
Behavioral task
behavioral1
Sample
9c0f25deda5fd180238008b7b97fab10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9c0f25deda5fd180238008b7b97fab10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
blue.o7lab.me:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
10
-
install
true
-
install_file
pop3.exe
-
install_folder
%Temp%
Targets
-
-
Target
9c0f25deda5fd180238008b7b97fab10_NeikiAnalytics
-
Size
1.5MB
-
MD5
9c0f25deda5fd180238008b7b97fab10
-
SHA1
f65d5a0b184c6bc0866ea214b2dbe37135eb6f9c
-
SHA256
78ce536df6722793cde9eca1bc9f78bc4abe3d17613eb950401c1fbc0335142c
-
SHA512
6d5c2a12818e8f6b6e0260ef81c18409c9b4319fff3ec7000ccf5b6dfa29b933ccfadcc414f8af83d3ca2c3f7def5f52f1ca649c698691c742e3559a0fb317b3
-
SSDEEP
24576:8NNGBDaQ3lPIiTr9befL/s20Z7RMnaGq3Lpu/ukPew0t4OH6Lwu69wYzGXIgA/H7:/lVwzl0Z7zGq7ptw0t9RfP
-
Detect ZGRat V1
-
Modifies security service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1