General
-
Target
6e29d5c879efaeecaa6909ae797fff10_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240520-atfleaba25
-
MD5
6e29d5c879efaeecaa6909ae797fff10
-
SHA1
8dde3baa2ead8e1d068fb03440e8c609f85fb510
-
SHA256
a056ea58e1ad33ca269668fcd643448aad89eaf201f63d107d7f482a00f97696
-
SHA512
989bf64516ea04e0e92ebfae7cd08b1d3c71949d1be2e0052ac3c63ee095af30903fae54c5103559da118ce058f21ff21853a11e2a593bbbe6cc5a6947f3dcd8
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5O:Rh+ZkldDPK8YaKjO
Static task
static1
Behavioral task
behavioral1
Sample
6e29d5c879efaeecaa6909ae797fff10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e29d5c879efaeecaa6909ae797fff10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
6e29d5c879efaeecaa6909ae797fff10_NeikiAnalytics.exe
-
Size
951KB
-
MD5
6e29d5c879efaeecaa6909ae797fff10
-
SHA1
8dde3baa2ead8e1d068fb03440e8c609f85fb510
-
SHA256
a056ea58e1ad33ca269668fcd643448aad89eaf201f63d107d7f482a00f97696
-
SHA512
989bf64516ea04e0e92ebfae7cd08b1d3c71949d1be2e0052ac3c63ee095af30903fae54c5103559da118ce058f21ff21853a11e2a593bbbe6cc5a6947f3dcd8
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5O:Rh+ZkldDPK8YaKjO
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-