Behavioral task
behavioral1
Sample
923c4221866465ce0e2cd934d37dd710_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
923c4221866465ce0e2cd934d37dd710_NeikiAnalytics
-
Size
3.1MB
-
MD5
923c4221866465ce0e2cd934d37dd710
-
SHA1
0cf1f9b74796241ae67678cd3de1e498eb893c36
-
SHA256
f0ebb38775564ab57f7e8fdb8c8c37e2eca832f5d369ec01c848599daf627cf5
-
SHA512
fcf7cb6158bc6f42b3e00a077487d6c3cdccfafda46f6b289c643a08c05a30824e3d8ab0f30570712acd101ba022014fe016afb407c5321637e5b3cbc0e74064
-
SSDEEP
49152:Pvkt62XlaSFNWPjljiFa2RoUYIPdqioGd66Q2gTHHB72eh2NT:Pv462XlaSFNWPjljiFXRoUYIPdHK/
Malware Config
Extracted
quasar
1.4.1
Bloxstrap
l2sbb-63720.portmap.io:63720
147cd381-4f9a-46fa-938c-116ed4ed9f05
-
encryption_key
EE5E4782203529F5A1A90C6405361C31EDF61FA1
-
install_name
Bloxstrap.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
BloxstrapMenu
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 923c4221866465ce0e2cd934d37dd710_NeikiAnalytics
Files
-
923c4221866465ce0e2cd934d37dd710_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ