General
-
Target
75da1def0cb2b50f387441c2ebed4120_NeikiAnalytics
-
Size
2.0MB
-
Sample
240515-efymaaga3z
-
MD5
75da1def0cb2b50f387441c2ebed4120
-
SHA1
7eca930b9afe2bf57ab9a3e546cc9969d4e5dce7
-
SHA256
2edf5f9fc75dc5cc293db94f337b66524386b0a4d1fd6e56f3d7ad30963cc790
-
SHA512
adc14364c6e6d614f2a92b7094cced4ca247f96a27844c6601b3f2519de72d3215bb3335eae095363dd82edc2a3ff31b631c61df272c8cf023f72f8bcce737e1
-
SSDEEP
49152:3XVUwwcIuRR61tCoC6Kof/qLvwATSUhlTovO5rb:3XVUwDjR6+oNwo05cO5
Behavioral task
behavioral1
Sample
75da1def0cb2b50f387441c2ebed4120_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
75da1def0cb2b50f387441c2ebed4120_NeikiAnalytics
-
Size
2.0MB
-
MD5
75da1def0cb2b50f387441c2ebed4120
-
SHA1
7eca930b9afe2bf57ab9a3e546cc9969d4e5dce7
-
SHA256
2edf5f9fc75dc5cc293db94f337b66524386b0a4d1fd6e56f3d7ad30963cc790
-
SHA512
adc14364c6e6d614f2a92b7094cced4ca247f96a27844c6601b3f2519de72d3215bb3335eae095363dd82edc2a3ff31b631c61df272c8cf023f72f8bcce737e1
-
SSDEEP
49152:3XVUwwcIuRR61tCoC6Kof/qLvwATSUhlTovO5rb:3XVUwDjR6+oNwo05cO5
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-