General
-
Target
5efbed893c9af6ae0042d0b8b2c2d090_NeikiAnalytics
-
Size
387KB
-
Sample
240514-dab1naga2s
-
MD5
5efbed893c9af6ae0042d0b8b2c2d090
-
SHA1
5371b9c6b3e76f0db786ae51d6aee604efb076c0
-
SHA256
1f9bb64c03784d72a65182024ef3a57204d5335e99f2c6d2c3d7babde1c3a50e
-
SHA512
0e8160f27770d699964b2a4020ae67290aa682f471a03a0a7289ac701e5238c2004a447ccf0e1088c88cb6cc1e19e30997dacf3207c87b20b0533ffe21ac1f82
-
SSDEEP
6144:HclsoLz0jzrOMX0kEwzU31zImLUKkOFyV9WYpcAjTPP:Hclso/0PriWi1zImobQ+XPP
Static task
static1
Behavioral task
behavioral1
Sample
5efbed893c9af6ae0042d0b8b2c2d090_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
5efbed893c9af6ae0042d0b8b2c2d090_NeikiAnalytics
-
Size
387KB
-
MD5
5efbed893c9af6ae0042d0b8b2c2d090
-
SHA1
5371b9c6b3e76f0db786ae51d6aee604efb076c0
-
SHA256
1f9bb64c03784d72a65182024ef3a57204d5335e99f2c6d2c3d7babde1c3a50e
-
SHA512
0e8160f27770d699964b2a4020ae67290aa682f471a03a0a7289ac701e5238c2004a447ccf0e1088c88cb6cc1e19e30997dacf3207c87b20b0533ffe21ac1f82
-
SSDEEP
6144:HclsoLz0jzrOMX0kEwzU31zImLUKkOFyV9WYpcAjTPP:Hclso/0PriWi1zImobQ+XPP
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-