General
-
Target
b6d6761fc3f0e0b6518d20eb1016d760_NeikiAnalytics
-
Size
3.1MB
-
Sample
240513-pbnxdseg47
-
MD5
b6d6761fc3f0e0b6518d20eb1016d760
-
SHA1
5b805e1f29044e08094bd4774c1b8ebe41d2c42d
-
SHA256
5281b2bb67cb6f582fb2218b20c9b215bf26fd42eba684fc1104e031bd0ac553
-
SHA512
00c3aa8dc5c56f8bc08d851f714d175751a9f08f3a021747ab269e8ecde57aa3accc945269e38fd7dc40db6408176ff747f78c4d38834a2f96c7354bf42ef710
-
SSDEEP
49152:mvUt62XlaSFNWPjljiFa2RoUYIwR53kar3LoGdzETHHB72eh2NT:mvI62XlaSFNWPjljiFXRoUYIQ31
Behavioral task
behavioral1
Sample
b6d6761fc3f0e0b6518d20eb1016d760_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.0.61:4782
9fdd3e80-d560-431b-b526-3ebbc1799110
-
encryption_key
5F91B88C67A9ACF78B2396771B3B6F2B4615CA57
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
b6d6761fc3f0e0b6518d20eb1016d760_NeikiAnalytics
-
Size
3.1MB
-
MD5
b6d6761fc3f0e0b6518d20eb1016d760
-
SHA1
5b805e1f29044e08094bd4774c1b8ebe41d2c42d
-
SHA256
5281b2bb67cb6f582fb2218b20c9b215bf26fd42eba684fc1104e031bd0ac553
-
SHA512
00c3aa8dc5c56f8bc08d851f714d175751a9f08f3a021747ab269e8ecde57aa3accc945269e38fd7dc40db6408176ff747f78c4d38834a2f96c7354bf42ef710
-
SSDEEP
49152:mvUt62XlaSFNWPjljiFa2RoUYIwR53kar3LoGdzETHHB72eh2NT:mvI62XlaSFNWPjljiFXRoUYIQ31
-
Quasar payload
-
Executes dropped EXE
-