General
-
Target
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics
-
Size
348KB
-
Sample
240515-we4kkscd32
-
MD5
0aa9c1791f32d5f01741cd43b3433970
-
SHA1
ccd00df6d2461cafc8b1a9c99439de2a61cf1f4a
-
SHA256
0cfb63a10f1b80b5ffc7547f31e66bb4a3cfb216cddbd0967a929dcecbd0bc35
-
SHA512
7fddb38d4e9b52317afd3ba48733347551e293a4a26150c7cb6be46c62a688ea9916b9ad2b8d47a0c285bcff7c3d90ff57bc7fbb4701388a18d30a3caa2d7dc4
-
SSDEEP
6144:K++qQ4i1FFiEKZZ69jDbOby8YkDPxHtO/7EIa:gplir6l//nQPJtC7EIa
Behavioral task
behavioral1
Sample
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.3.0.0
Victim
91.122.60.255:4782
QSR_MUTEX_hvw90hLuFOtv0Kig6i
-
encryption_key
hnFV3eO5HAJCHDY9IUGv
-
install_name
MicrosoftMonitor.exe
-
log_directory
Logs
-
reconnect_delay
300
-
startup_key
MicrosoftMonitor
-
subdirectory
WindowsDrv
Targets
-
-
Target
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics
-
Size
348KB
-
MD5
0aa9c1791f32d5f01741cd43b3433970
-
SHA1
ccd00df6d2461cafc8b1a9c99439de2a61cf1f4a
-
SHA256
0cfb63a10f1b80b5ffc7547f31e66bb4a3cfb216cddbd0967a929dcecbd0bc35
-
SHA512
7fddb38d4e9b52317afd3ba48733347551e293a4a26150c7cb6be46c62a688ea9916b9ad2b8d47a0c285bcff7c3d90ff57bc7fbb4701388a18d30a3caa2d7dc4
-
SSDEEP
6144:K++qQ4i1FFiEKZZ69jDbOby8YkDPxHtO/7EIa:gplir6l//nQPJtC7EIa
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-