General
-
Target
dcc50ec1cc74d2f605b455885e781f40_NeikiAnalytics
-
Size
423KB
-
Sample
240510-pdsclade7z
-
MD5
dcc50ec1cc74d2f605b455885e781f40
-
SHA1
594447e41168142a701dff4ce16182f50921a064
-
SHA256
bc67a67c9441eb9220a42bda0af159fa9ae2eefcfb83370d28157bed5436dea4
-
SHA512
23422811b4c3ba39b9f4a44654e9547e6e42e8bbac857f02ce086686572860d9964674fc67d8a4020c4794f6bcf98311be51fd0f3dfc6b910bd4f118975886b5
-
SSDEEP
6144:4LLIBZxDP7MoSoKdtpeK1W8ChvqkTLNfhR4hSoLSnfVF+YlkAo:0LmHD7nFKdtYK3ChvhhR4hTQVHlkAo
Static task
static1
Behavioral task
behavioral1
Sample
dcc50ec1cc74d2f605b455885e781f40_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
dcc50ec1cc74d2f605b455885e781f40_NeikiAnalytics
-
Size
423KB
-
MD5
dcc50ec1cc74d2f605b455885e781f40
-
SHA1
594447e41168142a701dff4ce16182f50921a064
-
SHA256
bc67a67c9441eb9220a42bda0af159fa9ae2eefcfb83370d28157bed5436dea4
-
SHA512
23422811b4c3ba39b9f4a44654e9547e6e42e8bbac857f02ce086686572860d9964674fc67d8a4020c4794f6bcf98311be51fd0f3dfc6b910bd4f118975886b5
-
SSDEEP
6144:4LLIBZxDP7MoSoKdtpeK1W8ChvqkTLNfhR4hSoLSnfVF+YlkAo:0LmHD7nFKdtYK3ChvhhR4hTQVHlkAo
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-