General
-
Target
b7ea20fdd805fb4eb379063ceb609a90_NeikiAnalytics
-
Size
364KB
-
Sample
240513-psep2sfd73
-
MD5
b7ea20fdd805fb4eb379063ceb609a90
-
SHA1
4f855478175080c7268e110dfb61aa094db69b70
-
SHA256
df92888c2d408f846ea1d7477cfd87dcb3b75803b0773321d4975c8fc9296306
-
SHA512
b7ac4ed4606a71f58077f93d8d05eeebb00e8e8211dbc56f2aae9cc486fe3fad3f00b9f6ee1f6834be7d5211362f00582bea36d2e772165c535084d3b3c6cbd4
-
SSDEEP
6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgM:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTZ
Static task
static1
Behavioral task
behavioral1
Sample
b7ea20fdd805fb4eb379063ceb609a90_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b7ea20fdd805fb4eb379063ceb609a90_NeikiAnalytics
-
Size
364KB
-
MD5
b7ea20fdd805fb4eb379063ceb609a90
-
SHA1
4f855478175080c7268e110dfb61aa094db69b70
-
SHA256
df92888c2d408f846ea1d7477cfd87dcb3b75803b0773321d4975c8fc9296306
-
SHA512
b7ac4ed4606a71f58077f93d8d05eeebb00e8e8211dbc56f2aae9cc486fe3fad3f00b9f6ee1f6834be7d5211362f00582bea36d2e772165c535084d3b3c6cbd4
-
SSDEEP
6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgM:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTZ
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-