General
-
Target
bd70a5336dc8b1ade6ab3a6acf8f80b0_NeikiAnalytics
-
Size
425KB
-
Sample
240510-lyds6abd62
-
MD5
bd70a5336dc8b1ade6ab3a6acf8f80b0
-
SHA1
cdc693348edbfd9ce36a99c1e7fc6c6d8df49766
-
SHA256
5cc20281a48cd34f2db1113990c962771687bd9820c9af3d0155c8e30d284e54
-
SHA512
0380dacb51232824903f822544e6a0e327d3fb9e57617888ee265c051b2fa2ae2c58b7d81252e7a889154f954112bd877b93c1a7771075e4d449ae00b977f74a
-
SSDEEP
6144:QGazuPt+M/p0zH5rO5+DPpHl0EA5E/c2GuTcqI3pLTaEA8v:QGazuV+0Oz6aPBvA5QvRcqwpan8v
Static task
static1
Behavioral task
behavioral1
Sample
bd70a5336dc8b1ade6ab3a6acf8f80b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
bd70a5336dc8b1ade6ab3a6acf8f80b0_NeikiAnalytics
-
Size
425KB
-
MD5
bd70a5336dc8b1ade6ab3a6acf8f80b0
-
SHA1
cdc693348edbfd9ce36a99c1e7fc6c6d8df49766
-
SHA256
5cc20281a48cd34f2db1113990c962771687bd9820c9af3d0155c8e30d284e54
-
SHA512
0380dacb51232824903f822544e6a0e327d3fb9e57617888ee265c051b2fa2ae2c58b7d81252e7a889154f954112bd877b93c1a7771075e4d449ae00b977f74a
-
SSDEEP
6144:QGazuPt+M/p0zH5rO5+DPpHl0EA5E/c2GuTcqI3pLTaEA8v:QGazuV+0Oz6aPBvA5QvRcqwpan8v
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-