General
-
Target
216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics
-
Size
902KB
-
Sample
240513-1kmapseg9x
-
MD5
216d4f8a9ccd9bc5557003df0f51ee90
-
SHA1
0ff206297ef7ba792652495e2b1cd60c40655718
-
SHA256
7f1496f5914fe3a3c86637c976e18ab4e8a68745b08b248bcd3106e3d1353c45
-
SHA512
854d67e063f4b7dc3532cb28efbefa911acae40c197f9e373f38287f603f521ef76845b138d75f14f67bbcefd0cef1070377f290508a65c976af57ff1b9f45a3
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9
Static task
static1
Behavioral task
behavioral1
Sample
216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
216d4f8a9ccd9bc5557003df0f51ee90_NeikiAnalytics
-
Size
902KB
-
MD5
216d4f8a9ccd9bc5557003df0f51ee90
-
SHA1
0ff206297ef7ba792652495e2b1cd60c40655718
-
SHA256
7f1496f5914fe3a3c86637c976e18ab4e8a68745b08b248bcd3106e3d1353c45
-
SHA512
854d67e063f4b7dc3532cb28efbefa911acae40c197f9e373f38287f603f521ef76845b138d75f14f67bbcefd0cef1070377f290508a65c976af57ff1b9f45a3
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa59:gh+ZkldoPK8YaKG9
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-