General
-
Target
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354_NeikiAnalytics
-
Size
127KB
-
Sample
240521-k9l38sga46
-
MD5
5e11247f7c10c0fcb0d33ed04de020ed
-
SHA1
831d4374efc63e927af6637bdaa0c1048972565f
-
SHA256
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354
-
SHA512
4d00aa67b1a8558dfbac941147a7beaa6741b9d3d2185ec7f00d650e6c0938e6347c6444c81f0d9dfdb586ead847b1b7302458d34a0d2d712de3b88a36270385
-
SSDEEP
3072:Uq3E2BfBSbEsz7nCAFVNNvBGvdO5gPaEjep8Fe7Z1iO7ZbvbnHV7:BRBfBSosz7nCA3NHCdXaEj7Fe7Z1iOFl
Behavioral task
behavioral1
Sample
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
stylaksiarra.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Stylnet-kCA6y0
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
DNmEMCnR
-
offline_keylogger
true
-
password
Stylak123456
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354_NeikiAnalytics
-
Size
127KB
-
MD5
5e11247f7c10c0fcb0d33ed04de020ed
-
SHA1
831d4374efc63e927af6637bdaa0c1048972565f
-
SHA256
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354
-
SHA512
4d00aa67b1a8558dfbac941147a7beaa6741b9d3d2185ec7f00d650e6c0938e6347c6444c81f0d9dfdb586ead847b1b7302458d34a0d2d712de3b88a36270385
-
SSDEEP
3072:Uq3E2BfBSbEsz7nCAFVNNvBGvdO5gPaEjep8Fe7Z1iO7ZbvbnHV7:BRBfBSosz7nCA3NHCdXaEj7Fe7Z1iOFl
-
NetWire RAT payload
-