General
-
Target
91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics
-
Size
903KB
-
Sample
240514-g1xltsdd7z
-
MD5
91b4c9e469a7dd18ca4ee3defcf96e50
-
SHA1
79f340e3742cae73e0108687d8a0ede1f5b1b826
-
SHA256
df07cc35fed48874945767ea181ac93a4cc7a70bdbaf815a277ab7e97366f27a
-
SHA512
d47d3bcf806841b575652cb28203152d05f59d32a64c0f74d67a5c10b41cb7cd4da325f8331ea973698e26b50b3ce3330509f871aa92075260ecc3307658ef8f
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL
Static task
static1
Behavioral task
behavioral1
Sample
91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
91b4c9e469a7dd18ca4ee3defcf96e50_NeikiAnalytics
-
Size
903KB
-
MD5
91b4c9e469a7dd18ca4ee3defcf96e50
-
SHA1
79f340e3742cae73e0108687d8a0ede1f5b1b826
-
SHA256
df07cc35fed48874945767ea181ac93a4cc7a70bdbaf815a277ab7e97366f27a
-
SHA512
d47d3bcf806841b575652cb28203152d05f59d32a64c0f74d67a5c10b41cb7cd4da325f8331ea973698e26b50b3ce3330509f871aa92075260ecc3307658ef8f
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5L:gh+ZkldoPK8YaKGL
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-