General
-
Target
3785d55ba4f8dcd0356b28417d3795e0_NeikiAnalytics.exe
-
Size
710KB
-
Sample
240519-zrc5yahf4v
-
MD5
3785d55ba4f8dcd0356b28417d3795e0
-
SHA1
5ff13ede50ea195d39eb50959b5c0de2c549df54
-
SHA256
9db21a7484495b5d8b898ca340678021b67e653dd02729cd4a72c94a564605ab
-
SHA512
28ddb52799606d0120a9661aa22295e5eb193e02fbf6cdbe58159dae03576657b8c6b7b0266197d192bb70ed339866fee90c3bb10e173ba0b70949a595bf35a7
-
SSDEEP
12288:pdrLbDZaNRpz6uey1yrzXKgo3W3awP0vErsCwZEHURng6MBD2svEg7CLLkR:TLDZMRpz6XZvP4ErGKBD1Eg79
Static task
static1
Behavioral task
behavioral1
Sample
3785d55ba4f8dcd0356b28417d3795e0_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
3785d55ba4f8dcd0356b28417d3795e0_NeikiAnalytics.exe
-
Size
710KB
-
MD5
3785d55ba4f8dcd0356b28417d3795e0
-
SHA1
5ff13ede50ea195d39eb50959b5c0de2c549df54
-
SHA256
9db21a7484495b5d8b898ca340678021b67e653dd02729cd4a72c94a564605ab
-
SHA512
28ddb52799606d0120a9661aa22295e5eb193e02fbf6cdbe58159dae03576657b8c6b7b0266197d192bb70ed339866fee90c3bb10e173ba0b70949a595bf35a7
-
SSDEEP
12288:pdrLbDZaNRpz6uey1yrzXKgo3W3awP0vErsCwZEHURng6MBD2svEg7CLLkR:TLDZMRpz6XZvP4ErGKBD1Eg79
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-