Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 09:18
Behavioral task
behavioral1
Sample
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354_NeikiAnalytics.exe
-
Size
127KB
-
MD5
5e11247f7c10c0fcb0d33ed04de020ed
-
SHA1
831d4374efc63e927af6637bdaa0c1048972565f
-
SHA256
2a6bc60aef245df0e12cd21cfc2a31bf9516aad5f4fef806414f16e7d66de354
-
SHA512
4d00aa67b1a8558dfbac941147a7beaa6741b9d3d2185ec7f00d650e6c0938e6347c6444c81f0d9dfdb586ead847b1b7302458d34a0d2d712de3b88a36270385
-
SSDEEP
3072:Uq3E2BfBSbEsz7nCAFVNNvBGvdO5gPaEjep8Fe7Z1iO7ZbvbnHV7:BRBfBSosz7nCA3NHCdXaEj7Fe7Z1iOFl
Malware Config
Extracted
netwire
stylaksiarra.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Stylnet-cgA6y0
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
DNmEMCnR
-
offline_keylogger
true
-
password
Stylak123456
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 7 IoCs
resource yara_rule behavioral2/memory/4780-0-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-2-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-4-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-6-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-8-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-10-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4780-12-0x0000000000400000-0x000000000042B000-memory.dmp netwire