General

  • Target

    8a0f013c8c62167a23580125650f8d50_NeikiAnalytics

  • Size

    8KB

  • Sample

    240515-f6txfsbe94

  • MD5

    8a0f013c8c62167a23580125650f8d50

  • SHA1

    059e8d6190bba982125810338a3ec74e7c09da8e

  • SHA256

    a15b918e612dbd8f83e8ce8112c478c2d00465a46f73ed85e0cec1e3157d4e3c

  • SHA512

    8b8a3fa1c12bb8b3432671d0066fa99851fce9ae1fb7e9a5102426b92078369feceab30e1ed72f0a1aba8deb6e738e0f76bf6cef8d1435af300f0d12a1ffc1b5

  • SSDEEP

    96:P1RSVCFMJ80RHajeatiA7cjb4I89Th/v3SFEgA+VgQfMrvH1Z1tLijnn/E7XGL04:PGQFydSeuiPb4IQmVGrtLMjnInav

Malware Config

Targets

    • Target

      8a0f013c8c62167a23580125650f8d50_NeikiAnalytics

    • Size

      8KB

    • MD5

      8a0f013c8c62167a23580125650f8d50

    • SHA1

      059e8d6190bba982125810338a3ec74e7c09da8e

    • SHA256

      a15b918e612dbd8f83e8ce8112c478c2d00465a46f73ed85e0cec1e3157d4e3c

    • SHA512

      8b8a3fa1c12bb8b3432671d0066fa99851fce9ae1fb7e9a5102426b92078369feceab30e1ed72f0a1aba8deb6e738e0f76bf6cef8d1435af300f0d12a1ffc1b5

    • SSDEEP

      96:P1RSVCFMJ80RHajeatiA7cjb4I89Th/v3SFEgA+VgQfMrvH1Z1tLijnn/E7XGL04:PGQFydSeuiPb4IQmVGrtLMjnInav

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks