General
-
Target
70b96a07a3624e8f408a98d0e7908820_NeikiAnalytics
-
Size
4.6MB
-
Sample
240516-bstx3seb89
-
MD5
70b96a07a3624e8f408a98d0e7908820
-
SHA1
c8c7f751e35062bdca81e354e62a78382e739048
-
SHA256
4c9b23dfd1094dec454837f0d026396ce5d6f14290780b3258a72d7911292b58
-
SHA512
e8f122c320e69b360a244cfab2fc4536843f4c4edc65b7e42c682dff5cc5c5ad53e20018a116a7d019606760322a5f7d6d09b59a402f20f7c733c7ccd689c3e8
-
SSDEEP
98304:g3GmmBkRb8dtrqlv5J0hW6Gr18urkIdzxYjbbFtjLSKWVSE7q:g3Glsgzulw5GkIdzx2vFVn+L+
Static task
static1
Behavioral task
behavioral1
Sample
70b96a07a3624e8f408a98d0e7908820_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
5.42.96.86:4449
tqssdzggysfwvryvef
-
delay
10
-
install
false
-
install_folder
%Temp%
Targets
-
-
Target
70b96a07a3624e8f408a98d0e7908820_NeikiAnalytics
-
Size
4.6MB
-
MD5
70b96a07a3624e8f408a98d0e7908820
-
SHA1
c8c7f751e35062bdca81e354e62a78382e739048
-
SHA256
4c9b23dfd1094dec454837f0d026396ce5d6f14290780b3258a72d7911292b58
-
SHA512
e8f122c320e69b360a244cfab2fc4536843f4c4edc65b7e42c682dff5cc5c5ad53e20018a116a7d019606760322a5f7d6d09b59a402f20f7c733c7ccd689c3e8
-
SSDEEP
98304:g3GmmBkRb8dtrqlv5J0hW6Gr18urkIdzxYjbbFtjLSKWVSE7q:g3Glsgzulw5GkIdzx2vFVn+L+
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-