General
-
Target
64cd0c75e14d02b9f423ad2533306d10_NeikiAnalytics.exe
-
Size
1.4MB
-
Sample
240518-banckscb59
-
MD5
64cd0c75e14d02b9f423ad2533306d10
-
SHA1
744ffa6d05ce494fbe61ddcc42e60c060e165217
-
SHA256
f80b66065daf4e2d61961bb966301e17231ab8ac033f4ece7c612d3a5b66dbbd
-
SHA512
fc69d92e63d50c3e079f4144f3a9b03d20c0c41256ad777ed460b3bca46ba5aa67dcc7cf8969f8758a06103569b975e8a90b3b2ac8b38bef36a32b82a82af82f
-
SSDEEP
24576:kD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjoY:kp7E+QrFUBgq21
Static task
static1
Behavioral task
behavioral1
Sample
64cd0c75e14d02b9f423ad2533306d10_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
remcos
1.7 Pro
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
64cd0c75e14d02b9f423ad2533306d10_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
64cd0c75e14d02b9f423ad2533306d10
-
SHA1
744ffa6d05ce494fbe61ddcc42e60c060e165217
-
SHA256
f80b66065daf4e2d61961bb966301e17231ab8ac033f4ece7c612d3a5b66dbbd
-
SHA512
fc69d92e63d50c3e079f4144f3a9b03d20c0c41256ad777ed460b3bca46ba5aa67dcc7cf8969f8758a06103569b975e8a90b3b2ac8b38bef36a32b82a82af82f
-
SSDEEP
24576:kD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjoY:kp7E+QrFUBgq21
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-